Show filters
538 Total Results
Displaying 331-340 of 538
Sort by:
Attacker Value
Unknown
CVE-2019-17389
Disclosure Date: October 09, 2019 (last updated November 27, 2024)
In RIOT 2019.07, the MQTT-SN implementation (asymcute) mishandles errors occurring during a read operation on a UDP socket. The receive loop ends. This allows an attacker (via a large packet) to prevent a RIOT MQTT-SN client from working until the device is restarted.
0
Attacker Value
Unknown
CVE-2019-17225
Disclosure Date: October 06, 2019 (last updated November 27, 2024)
Subrion 4.2.1 allows XSS via the panel/members/ Username, Full Name, or Email field, aka an "Admin Member JSON Update" issue.
0
Attacker Value
Unknown
CVE-2019-16414
Disclosure Date: September 30, 2019 (last updated November 27, 2024)
A DOM based XSS in GFI Kerio Control v9.3.0 allows embedding of malicious code and manipulating the login page to send back a victim's cleartext credentials to an attacker via a login/?reason=failure&NTLM= URI.
0
Attacker Value
Unknown
CVE-2019-16754
Disclosure Date: September 24, 2019 (last updated November 27, 2024)
RIOT 2019.07 contains a NULL pointer dereference in the MQTT-SN implementation (asymcute), potentially allowing an attacker to crash a network node running RIOT. This requires spoofing an MQTT server response. To do so, the attacker needs to know the MQTT MsgID of a pending MQTT protocol message and the ephemeral port used by RIOT's MQTT implementation. Additionally, the server IP address is required for spoofing the packet.
0
Attacker Value
Unknown
CVE-2019-5482
Disclosure Date: September 16, 2019 (last updated November 08, 2023)
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
0
Attacker Value
Unknown
CVE-2019-12402
Disclosure Date: August 30, 2019 (last updated November 08, 2023)
The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress.
0
Attacker Value
Unknown
CVE-2019-15702
Disclosure Date: August 27, 2019 (last updated November 27, 2024)
In the TCP implementation (gnrc_tcp) in RIOT through 2019.07, the parser for TCP options does not terminate on all inputs, allowing a denial-of-service, because sys/net/gnrc/transport_layer/tcp/gnrc_tcp_option.c has an infinite loop for an unknown zero-length option.
0
Attacker Value
Unknown
CVE-2018-20999
Disclosure Date: August 26, 2019 (last updated November 27, 2024)
An issue was discovered in the orion crate before 0.11.2 for Rust. reset() calls cause incorrect results.
0
Attacker Value
Unknown
CVE-2019-12400
Disclosure Date: August 23, 2019 (last updated November 08, 2023)
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.
0
Attacker Value
Unknown
CVE-2019-15134
Disclosure Date: August 17, 2019 (last updated November 27, 2024)
RIOT through 2019.07 contains a memory leak in the TCP implementation (gnrc_tcp), allowing an attacker to consume all memory available for network packets and thus effectively stopping all network threads from working. This is related to _receive in sys/net/gnrc/transport_layer/tcp/gnrc_tcp_eventloop.c upon receiving an ACK before a SYN.
0