Show filters
207 Total Results
Displaying 161-170 of 207
Sort by:
Attacker Value
Unknown

CVE-2018-7185

Disclosure Date: March 06, 2018 (last updated January 15, 2025)
The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.
Attacker Value
Unknown

CVE-2018-7184

Disclosure Date: March 06, 2018 (last updated January 15, 2025)
ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.
0
Attacker Value
Unknown

CVE-2018-7170

Disclosure Date: March 06, 2018 (last updated January 15, 2025)
ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.
Attacker Value
Unknown

CVE-2018-5379

Disclosure Date: February 19, 2018 (last updated November 26, 2024)
The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.
0
Attacker Value
Unknown

CVE-2018-1000007

Disclosure Date: January 24, 2018 (last updated November 26, 2024)
libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value. Sending the same set of headers to subsequent hosts is in particular a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using client's request.
Attacker Value
Unknown

CVE-2016-8610

Disclosure Date: November 13, 2017 (last updated January 27, 2024)
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
Attacker Value
Unknown

CVE-2017-10871

Disclosure Date: November 13, 2017 (last updated November 26, 2024)
Buffer overflow in NTT DOCOMO Wi-Fi STATION L-02F Software version L02F-MDM9625-V10h-JUN-23-2017-DCM-JP and earlier allows an attacker to execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown

CVE-2017-15906

Disclosure Date: October 26, 2017 (last updated November 26, 2024)
The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
Attacker Value
Unknown

CVE-2017-14491

Disclosure Date: October 04, 2017 (last updated January 15, 2025)
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
Attacker Value
Unknown

CVE-2017-10845

Disclosure Date: September 15, 2017 (last updated November 26, 2024)
Wi-Fi STATION L-02F Software version V10g and earlier allows remote attackers to access the device with administrative privileges and perform unintended operations through a backdoor account.
0