Page 5 of 24 results (0.002 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 2

Snort 1.8.3 does not properly define the minimum ICMP header size, which allows remote attackers to cause a denial of service (crash and core dump) via a malformed ICMP packet. El snort 1.8.3 no define correctamente el tamaño mínimo de cabecera ICMP, que permite a atacantes remotos causar una negación de servicio (crash y core dump) vía un paquete mal formado ICMP. • https://www.exploit-db.com/exploits/21213 http://online.securityfocus.com/archive/1/249340 http://online.securityfocus.com/cgi-bin/archive.pl?id=1&start=2002-03-08&end=2002-03-14&mid=249623&threads=1 http://www.iss.net/security_center/static/7874.php http://www.osvdb.org/2022 http://www.securityfocus.com/bid/3849 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Unknown vulnerability in IP defragmenter (frag2) in Snort before 1.8.3 allows attackers to cause a denial of service (crash). • http://archives.neohapsis.com/archives/snort/2001-11/0990.html •

CVSS: 7.5EPSS: 7%CPEs: 8EXPL: 1

Various Intrusion Detection Systems (IDS) including (1) Cisco Secure Intrusion Detection System, (2) Cisco Catalyst 6000 Intrusion Detection System Module, (3) Dragon Sensor 4.x, (4) Snort before 1.8.1, (5) ISS RealSecure Network Sensor 5.x and 6.x before XPU 3.2, and (6) ISS RealSecure Server Sensor 5.5 and 6.0 for Windows, allow remote attackers to evade detection of HTTP attacks via non-standard "%u" Unicode encoding of ASCII characters in the requested URL. • https://www.exploit-db.com/exploits/21100 http://marc.info/?l=bugtraq&m=99972950200602&w=2 http://www.cisco.com/warp/public/707/cisco-intrusion-detection-obfuscation-vuln-pub.shtml http://www.kb.cert.org/vuls/id/548515 http://www.securityfocus.com/bid/3292 http://xforce.iss.net/alerts/advise95.php •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Snort 1.6, when running in straight ASCII packet logging mode or IDS mode with straight decoded ASCII packet logging selected, allows remote attackers to cause a denial of service (crash) by sending non-IP protocols that Snort does not know about, as demonstrated by an nmap protocol scan. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0122.html http://archives.neohapsis.com/archives/bugtraq/2000-06/0126.html •