Show filters
718 Total Results
Displaying 1-10 of 718
Sort by:
Attacker Value
Moderate
OpenSSL TLS Server Crash (NULL pointer dereference) — CVE-2021-3449
Disclosure Date: March 25, 2021 (last updated February 22, 2025)
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
4
Attacker Value
Unknown
CVE-2023-28971
Disclosure Date: April 12, 2023 (last updated October 08, 2023)
An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the timescaledb feature of Juniper Networks Paragon Active Assurance (PAA) (Formerly Netrounds) allows an attacker to bypass existing firewall rules and limitations used to restrict internal communcations. The Test Agents (TA) Appliance connects to the Control Center (CC) using OpenVPN. TA's are assigned an internal IP address in the 100.70.0.0/16 range. Firewall rules exists to limit communication from TA's to the CC to specific services only. OpenVPN is configured to not allow direct communication between Test Agents in the OpenVPN application itself, and routing is normally not enabled on the server running the CC application. The timescaledb feature is installed as an optional package on the Control Center. When the timescaledb container is started, this causes side-effects by bypassing the existing firewall rules and limitations for Test Agent communications. Note: This issue only affects cust…
1
Attacker Value
Unknown
CVE-2023-40222
Disclosure Date: February 04, 2025 (last updated February 05, 2025)
In Ashlar-Vellum Cobalt versions prior to v12 SP2 Build (1204.200), the affected application lacks proper validation of user-supplied data when parsing CO files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
0
Attacker Value
Unknown
CVE-2023-39943
Disclosure Date: February 04, 2025 (last updated February 05, 2025)
In Ashlar-Vellum Cobalt versions prior to v12 SP2 Build (1204.200), the affected application lacks proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
0
Attacker Value
Unknown
CVE-2024-49843
Disclosure Date: February 03, 2025 (last updated February 06, 2025)
Memory corruption while processing IOCTL from user space to handle GPU AHB bus error.
0
Attacker Value
Unknown
CVE-2024-49839
Disclosure Date: February 03, 2025 (last updated February 06, 2025)
Memory corruption during management frame processing due to mismatch in T2LM info element.
0
Attacker Value
Unknown
CVE-2024-49838
Disclosure Date: February 03, 2025 (last updated February 06, 2025)
Information disclosure while parsing the OCI IE with invalid length.
0
Attacker Value
Unknown
CVE-2024-49834
Disclosure Date: February 03, 2025 (last updated February 06, 2025)
Memory corruption while power-up or power-down sequence of the camera sensor.
0
Attacker Value
Unknown
CVE-2024-49833
Disclosure Date: February 03, 2025 (last updated February 06, 2025)
Memory corruption can occur in the camera when an invalid CID is used.
0
Attacker Value
Unknown
CVE-2024-49832
Disclosure Date: February 03, 2025 (last updated February 06, 2025)
Memory corruption in Camera due to unusually high number of nodes passed to AXI port.
0