Show filters
820 Total Results
Displaying 701-710 of 820
Sort by:
Attacker Value
Unknown
CVE-2018-14368
Disclosure Date: July 19, 2018 (last updated November 08, 2023)
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long.
0
Attacker Value
Unknown
CVE-2018-14342
Disclosure Date: July 19, 2018 (last updated November 08, 2023)
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.
0
Attacker Value
Unknown
CVE-2018-10892
Disclosure Date: July 06, 2018 (last updated November 27, 2024)
The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.
0
Attacker Value
Unknown
CVE-2018-12976
Disclosure Date: July 05, 2018 (last updated November 08, 2023)
In Go Doc Dot Org (gddo) through 2018-06-27, an attacker could use specially crafted <go-import> tags in packages being fetched by gddo to cause a directory traversal and remote code execution.
0
Attacker Value
Unknown
CVE-2018-12018
Disclosure Date: July 05, 2018 (last updated November 27, 2024)
The GetBlockHeadersMsg handler in the LES protocol implementation in Go Ethereum (aka geth) before 1.8.11 may lead to an access violation because of an integer signedness error for the array index, which allows attackers to launch a Denial of Service attack by sending a packet with a -1 query.Skip value. The vulnerable remote node would be crashed by such an attack immediately, aka the EPoD (Ethereum Packet of Death) issue.
0
Attacker Value
Unknown
CVE-2016-10563
Disclosure Date: May 31, 2018 (last updated November 26, 2024)
During the installation process, the go-ipfs-deps module before 0.4.4 insecurely downloads resources over HTTP. This allows for a MITM attack to compromise the integrity of the resources used by this module and could allow for further compromise.
0
Attacker Value
Unknown
CVE-2015-9236
Disclosure Date: May 31, 2018 (last updated November 26, 2024)
Hapi versions less than 11.0.0 implement CORS incorrectly and allowed for configurations that at best returned inconsistent headers and at worst allowed cross-origin activities that were expected to be forbidden. If the connection has CORS enabled but one route has it off, and the route is not GET, the OPTIONS prefetch request will return the default CORS headers and then the actual request will go through and return no CORS headers. This defeats the purpose of turning CORS on the route.
0
Attacker Value
Unknown
CVE-2016-10411
Disclosure Date: April 18, 2018 (last updated November 26, 2024)
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, and SD 835, RTP daemon crashes and terminates VT call when UE receives RTCP unknown APP packet report which caused the parser to miss an end of RTCP packet length and go on forever looking for it, even going beyond the limits of the RTCP Packet length.
0
Attacker Value
Unknown
CVE-2018-10080
Disclosure Date: April 13, 2018 (last updated November 26, 2024)
Secutech RiS-11, RiS-22, and RiS-33 devices with firmware V5.07.52_es_FRI01 allow DNS settings changes via a goform/AdvSetDns?GO=wan_dns.asp request in conjunction with a crafted admin cookie.
0
Attacker Value
Unknown
CVE-2018-9257
Disclosure Date: April 04, 2018 (last updated November 08, 2023)
In Wireshark 2.4.0 to 2.4.5, the CQL dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-cql.c by checking for a nonzero number of columns.
0