Show filters
813 Total Results
Displaying 451-460 of 813
Sort by:
Attacker Value
Unknown
CVE-2018-18585
Disclosure Date: October 23, 2018 (last updated November 27, 2024)
chmd_read_headers in mspack/chmd.c in libmspack before 0.8alpha accepts a filename that has '\0' as its first or second character (such as the "/\0" name).
0
Attacker Value
Unknown
CVE-2018-18584
Disclosure Date: October 23, 2018 (last updated November 27, 2024)
In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte too small for the maximal Quantum block, leading to an out-of-bounds write.
0
Attacker Value
Unknown
CVE-2018-16737
Disclosure Date: October 10, 2018 (last updated November 08, 2023)
tinc before 1.0.30 has a broken authentication protocol, without even a partial mitigation.
0
Attacker Value
Unknown
CVE-2018-16738
Disclosure Date: October 10, 2018 (last updated November 08, 2023)
tinc 1.0.30 through 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1.
0
Attacker Value
Unknown
CVE-2018-16758
Disclosure Date: October 10, 2018 (last updated November 08, 2023)
Missing message authentication in the meta-protocol in Tinc VPN version 1.0.34 and earlier allows a man-in-the-middle attack to disable the encryption of VPN packets.
0
Attacker Value
Unknown
Crafted service parameters allows to induce unexpected behaviour in obs-service…
Disclosure Date: October 09, 2018 (last updated November 08, 2023)
Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106.
0
Attacker Value
Unknown
CVE-2018-16806
Disclosure Date: September 10, 2018 (last updated November 27, 2024)
A Pektron Passive Keyless Entry and Start (PKES) system, as used on the Tesla Model S and possibly other vehicles, relies on the DST40 cipher, which makes it easier for attackers to obtain access via an approach involving a 5.4 TB precomputation, followed by wake-frame reception and two challenge/response operations, to clone a key fob within a few seconds.
0
Attacker Value
Unknown
CVE-2018-0421
Disclosure Date: September 05, 2018 (last updated November 27, 2024)
A vulnerability in TCP connection management in Cisco Prime Access Registrar could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition when the application unexpectedly restarts. The vulnerability is due to incorrect handling of incoming TCP SYN packets to specific listening ports. The improper handling of the TCP SYN packets could cause a system file description to be allocated and not freed. An attacker could exploit this vulnerability by sending a crafted stream of TCP SYN packets to the application. A successful exploit could allow the attacker to cause the application to eventually restart if a file description cannot be obtained.
0
Attacker Value
Unknown
CVE-2018-0369
Disclosure Date: July 16, 2018 (last updated November 27, 2024)
A vulnerability in the reassembly logic for fragmented IPv4 packets of Cisco StarOS running on virtual platforms could allow an unauthenticated, remote attacker to trigger a reload of the npusim process, resulting in a denial of service (DoS) condition. There are four instances of the npusim process running per Service Function (SF) instance, each handling a subset of all traffic flowing across the device. It is possible to trigger a reload of all four instances of the npusim process around the same time. The vulnerability is due to improper handling of fragmented IPv4 packets containing options. An attacker could exploit this vulnerability by sending a malicious IPv4 packet across an affected device. An exploit could allow the attacker to trigger a restart of the npusim process, which will result in all traffic queued toward this instance of the npusim process to be dropped while the process is restarting. The npusim process typically restarts within less than a second. This vulnerab…
0
Attacker Value
Unknown
CVE-2018-13774
Disclosure Date: July 09, 2018 (last updated November 27, 2024)
The mintToken function of a smart contract implementation for Bitstarti, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
0