Page 5 of 23 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Unknown vulnerability in IP defragmenter (frag2) in Snort before 1.8.3 allows attackers to cause a denial of service (crash). • http://archives.neohapsis.com/archives/snort/2001-11/0990.html •

CVSS: 7.5EPSS: 7%CPEs: 8EXPL: 1

Various Intrusion Detection Systems (IDS) including (1) Cisco Secure Intrusion Detection System, (2) Cisco Catalyst 6000 Intrusion Detection System Module, (3) Dragon Sensor 4.x, (4) Snort before 1.8.1, (5) ISS RealSecure Network Sensor 5.x and 6.x before XPU 3.2, and (6) ISS RealSecure Server Sensor 5.5 and 6.0 for Windows, allow remote attackers to evade detection of HTTP attacks via non-standard "%u" Unicode encoding of ASCII characters in the requested URL. • https://www.exploit-db.com/exploits/21100 http://marc.info/?l=bugtraq&m=99972950200602&w=2 http://www.cisco.com/warp/public/707/cisco-intrusion-detection-obfuscation-vuln-pub.shtml http://www.kb.cert.org/vuls/id/548515 http://www.securityfocus.com/bid/3292 http://xforce.iss.net/alerts/advise95.php •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Snort 1.6, when running in straight ASCII packet logging mode or IDS mode with straight decoded ASCII packet logging selected, allows remote attackers to cause a denial of service (crash) by sending non-IP protocols that Snort does not know about, as demonstrated by an nmap protocol scan. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0122.html http://archives.neohapsis.com/archives/bugtraq/2000-06/0126.html •