Show filters
392 Total Results
Displaying 151-160 of 392
Sort by:
Attacker Value
Unknown
CVE-2018-16452
Disclosure Date: October 03, 2019 (last updated November 08, 2023)
The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.
0
Attacker Value
Unknown
CVE-2018-14882
Disclosure Date: October 03, 2019 (last updated November 08, 2023)
The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.
0
Attacker Value
Unknown
CVE-2018-16228
Disclosure Date: October 03, 2019 (last updated November 08, 2023)
The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().
0
Attacker Value
Unknown
CVE-2018-14464
Disclosure Date: October 03, 2019 (last updated November 08, 2023)
The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs().
0
Attacker Value
Unknown
CVE-2018-14881
Disclosure Date: October 03, 2019 (last updated November 08, 2023)
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).
0
Attacker Value
Unknown
CVE-2018-14468
Disclosure Date: October 03, 2019 (last updated November 08, 2023)
The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().
0
Attacker Value
Unknown
CVE-2019-3414
Disclosure Date: July 22, 2019 (last updated November 27, 2024)
All versions up to V1.19.20.02 of ZTE OTCP product are impacted by XSS vulnerability. Due to XSS, when an attacker invokes the security management to obtain the resources of the specified operation code owned by a user, the malicious script code could be transmitted in the parameter. If the front end does not process the returned result from the interface properly, the malicious script may be executed and the user cookie or other important information may be stolen.
0
Attacker Value
Unknown
CVE-2019-1010220
Disclosure Date: July 22, 2019 (last updated November 08, 2023)
tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open a specially crafted pcap file.
0
Attacker Value
Unknown
CVE-2018-16563
Disclosure Date: March 21, 2019 (last updated November 27, 2024)
A vulnerability has been identified in Firmware variant IEC 61850 for EN100 Ethernet module (All versions < V4.35), Firmware variant MODBUS TCP for EN100 Ethernet module (All versions), Firmware variant DNP3 TCP for EN100 Ethernet module (All versions), Firmware variant IEC104 for EN100 Ethernet module (All versions), Firmware variant Profinet IO for EN100 Ethernet module (All versions), SIPROTEC 5 relays with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.82), SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules (All versions < V7.58). Specially crafted packets to port 102/tcp could cause a denial-of-service condition in the affected products. A manual restart is required to recover the EN100 module functionality of the affected devices. Successful exploitation requires an attacker with network access to send multiple packets to the affected products or modules. As a precondition the IEC 61850-M…
0
Attacker Value
Unknown
CVE-2019-8377
Disclosure Date: February 17, 2019 (last updated November 08, 2023)
An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_ipv6_l4proto() located at get.c. This can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.
0