Show filters
92 Total Results
Displaying 21-30 of 92
Sort by:
Attacker Value
Unknown
CVE-2017-13078
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
0
Attacker Value
Unknown
CVE-2017-13080
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
0
Attacker Value
Unknown
CVE-2017-13077
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
0
Attacker Value
Unknown
CVE-2017-14491
Disclosure Date: October 04, 2017 (last updated January 15, 2025)
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
0
Attacker Value
Unknown
CVE-2017-14496
Disclosure Date: October 03, 2017 (last updated November 08, 2023)
Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.
0
Attacker Value
Unknown
CVE-2017-14494
Disclosure Date: October 03, 2017 (last updated November 08, 2023)
dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.
0
Attacker Value
Unknown
CVE-2017-13704
Disclosure Date: October 03, 2017 (last updated November 08, 2023)
In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platforms), making dnsmasq crash.
0
Attacker Value
Unknown
CVE-2017-14493
Disclosure Date: October 03, 2017 (last updated November 08, 2023)
Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
0
Attacker Value
Unknown
CVE-2015-3138
Disclosure Date: September 28, 2017 (last updated November 26, 2024)
print-wb.c in tcpdump before 4.7.4 allows remote attackers to cause a denial of service (segmentation fault and process crash).
0
Attacker Value
Unknown
CVE-2017-6594
Disclosure Date: August 28, 2017 (last updated November 26, 2024)
The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.
0