Page 2 of 18 results (0.002 seconds)

CVSS: 6.5EPSS: 0%CPEs: 75EXPL: 0

SonicOS post-authentication Stack-Based Buffer Overflow vulnerability in the getPacketReplayData.json URL endpoint leads to a firewall crash. La vulnerabilidad de desbordamiento del búfer basado posterior a la autenticación de SonicOS en el endpoint de URL getPacketReplayData.json provoca una falla del firewall. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 75EXPL: 0

SonicOS post-authentication user assertion failure leads to Stack-Based Buffer Overflow vulnerability via main.cgi leads to a firewall crash. La falla de aserción del usuario posterior a la autenticación de SonicOS conduce a una vulnerabilidad de desbordamiento del búfer a través de main.cgi que provoca una falla del firewall. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 75EXPL: 0

SonicOS post-authentication stack-based buffer overflow vulnerability in the sonicflow.csv and appflowsessions.csv URL endpoints leads to a firewall crash. La vulnerabilidad de desbordamiento del búfer de autenticación posterior de SonicOS en los endpoints de URL sonicflow.csv y appflowsessions.csv provoca una falla del firewall. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 75EXPL: 0

SonicOS post-authentication stack-based buffer overflow vulnerability in the getBookmarkList.json URL endpoint leads to a firewall crash. La vulnerabilidad de desbordamiento del búfer de autenticación posterior de SonicOS en el endpoint de la URL getBookmarkList.json provoca una falla del firewall. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 59EXPL: 1

The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key. • https://papers.mathyvanhoef.com/usenix2023-wifi.pdf https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006 https://www.freebsd.org/security/advisories/FreeBSD-SA-23:11.wifi.asc https://www.wi-fi.org/discover-wi-fi/passpoint • CWE-290: Authentication Bypass by Spoofing •