Show filters
58 Total Results
Displaying 31-40 of 58
Sort by:
Attacker Value
Unknown
CVE-2017-13081
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
0
Attacker Value
Unknown
CVE-2017-13082
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
0
Attacker Value
Unknown
CVE-2017-13079
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
0
Attacker Value
Unknown
CVE-2017-13087
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
0
Attacker Value
Unknown
CVE-2017-13078
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
0
Attacker Value
Unknown
CVE-2017-13080
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
0
Attacker Value
Unknown
CVE-2017-13077
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
0
Attacker Value
Unknown
CVE-2017-0903
Disclosure Date: October 11, 2017 (last updated November 26, 2024)
RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
0
Attacker Value
Unknown
CVE-2017-14064
Disclosure Date: August 31, 2017 (last updated November 26, 2024)
Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.
0
Attacker Value
Unknown
CVE-2017-7424
Disclosure Date: August 21, 2017 (last updated November 08, 2023)
A Path Traversal (CWE-22) vulnerability in esfadmingui in Micro Focus Enterprise Developer and Enterprise Server 2.3, 2.3 Update 1 before Hotfix 8, and 2.3 Update 2 before Hotfix 9 allows remote authenticated users to download arbitrary files from a system running the product, if this component is configured. Note esfadmingui is not enabled by default.
0