Show filters
924 Total Results
Displaying 81-90 of 924
Sort by:
Attacker Value
Unknown
CVE-2023-1994
Disclosure Date: April 12, 2023 (last updated October 21, 2023)
GQUIC dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
0
Attacker Value
Unknown
CVE-2023-1993
Disclosure Date: April 12, 2023 (last updated October 21, 2023)
LISP dissector large loop in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
0
Attacker Value
Unknown
CVE-2023-1992
Disclosure Date: April 12, 2023 (last updated October 21, 2023)
RPCoRDMA dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
0
Attacker Value
Unknown
CVE-2023-1161
Disclosure Date: March 06, 2023 (last updated October 21, 2023)
ISO 15765 and ISO 10681 dissector crash in Wireshark 4.0.0 to 4.0.3 and 3.6.0 to 3.6.11 allows denial of service via packet injection or crafted capture file
0
Attacker Value
Unknown
CVE-2023-25717
Disclosure Date: February 13, 2023 (last updated October 08, 2023)
Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.
0
Attacker Value
Unknown
CVE-2022-46650
Disclosure Date: February 10, 2023 (last updated October 08, 2023)
Acemanager in ALEOS before version 4.16 allows a user with valid credentials to reconfigure the device to expose the ACEManager credentials on the pre-login status page.
0
Attacker Value
Unknown
CVE-2022-46649
Disclosure Date: February 10, 2023 (last updated October 08, 2023)
Acemanager in ALEOS before version 4.16 allows a user with valid credentials to manipulate the IP logging operation to execute arbitrary shell commands on the device.
0
Attacker Value
Unknown
CVE-2021-46873
Disclosure Date: January 29, 2023 (last updated October 08, 2023)
WireGuard, such as WireGuard 0.5.3 on Windows, does not fully account for the possibility that an adversary might be able to set a victim's system time to a future value, e.g., because unauthenticated NTP is used. This can lead to an outcome in which one static private key becomes permanently useless.
0
Attacker Value
Unknown
CVE-2023-22737
Disclosure Date: January 28, 2023 (last updated October 08, 2023)
wire-server provides back end services for Wire, a team communication and collaboration platform. Prior to version 2022-12-09, every member of a Conversation can remove a Bot from a Conversation due to a missing permissions check. Only Conversation admins should be able to remove Bots. Regular Conversations are not allowed to do so. The issue is fixed in wire-server 2022-12-09 and is already deployed on all Wire managed services. On-premise instances of wire-server need to be updated to 2022-12-09/Chart 4.29.0, so that their backends are no longer affected. There are no known workarounds.
0
Attacker Value
Unknown
CVE-2022-39380
Disclosure Date: January 27, 2023 (last updated October 08, 2023)
Wire web-app is part of Wire communications. Versions prior to 2022-11-02 are subject to Improper Handling of Exceptional Conditions. In the wire-webapp, certain combinations of Markdown formatting can trigger an unhandled error in the conversion to HTML representation. The error makes it impossible to display the affected chat history, other conversations are not affected. The issue has been fixed in version 2022-11-02 and is already deployed on all Wire managed services. On-premise instances of wire-webapp need to be updated to docker tag 2022-11-02-production.0-v0.31.9-0-337e400 or wire-server 2022-11-03 (chart/4.26.0), so that their applications are no longer affected. As a workaround, you may use an iOS or Android client and delete the corresponding message from the history OR write 30 or more messages into the affected conversation to prevent the client from further rendering of the corresponding message. When attempting to retrieve messages from the conversation history, the er…
0