Show filters
15 Total Results
Displaying 1-10 of 15
Sort by:
Attacker Value
Unknown

CVE-2018-1270

Disclosure Date: April 06, 2018 (last updated November 08, 2023)
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.
Attacker Value
Unknown

CVE-2017-18017

Disclosure Date: January 03, 2018 (last updated April 25, 2024)
The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.
Attacker Value
Unknown

CVE-2017-13088

Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
0
Attacker Value
Unknown

CVE-2017-13084

Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
0
Attacker Value
Unknown

CVE-2017-13086

Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
0
Attacker Value
Unknown

CVE-2017-13081

Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
0
Attacker Value
Unknown

CVE-2017-13082

Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
0
Attacker Value
Unknown

CVE-2017-13079

Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
0
Attacker Value
Unknown

CVE-2017-13087

Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
0
Attacker Value
Unknown

CVE-2017-13078

Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
0