CVE-2024-23835
- EPSS 0.19%
- Veröffentlicht 26.02.2024 16:27:57
- Zuletzt bearbeitet 18.12.2024 18:07:03
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.3, excessive memory use during pgsql parsing could lead to OOM-related crashes. This vulnerability is patched...
CVE-2023-35853
- EPSS 0.55%
- Veröffentlicht 19.06.2023 04:15:11
- Zuletzt bearbeitet 11.12.2024 17:15:13
In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section.
CVE-2023-35852
- EPSS 0.58%
- Veröffentlicht 19.06.2023 04:15:11
- Zuletzt bearbeitet 21.11.2024 08:08:49
In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is...
CVE-2020-19678
- EPSS 0.23%
- Veröffentlicht 06.04.2023 18:15:08
- Zuletzt bearbeitet 12.02.2025 16:15:31
Directory Traversal vulnerability found in Pfsense v.2.1.3 and Pfsense Suricata v.1.4.6 pkg v.1.0.1 allows a remote attacker to obtain sensitive information via the file parameter to suricata/suricata_logs_browser.php.
CVE-2021-45098
- EPSS 0.55%
- Veröffentlicht 16.12.2021 05:15:08
- Zuletzt bearbeitet 21.11.2024 06:31:57
An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to injec...
CVE-2021-37592
- EPSS 0.14%
- Veröffentlicht 19.11.2021 15:15:08
- Zuletzt bearbeitet 21.11.2024 06:15:28
Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.
CVE-2021-35063
- EPSS 1.08%
- Veröffentlicht 22.07.2021 18:15:23
- Zuletzt bearbeitet 21.11.2024 06:11:46
Suricata before 5.0.7 and 6.x before 6.0.3 has a "critical evasion."
CVE-2019-18625
- EPSS 0.25%
- Veröffentlicht 06.01.2020 21:15:11
- Zuletzt bearbeitet 21.11.2024 04:33:23
An issue was discovered in Suricata 5.0.0. It was possible to bypass/evade any tcp based signature by faking a closed TCP session using an evil server. After the TCP SYN packet, it is possible to inject a RST ACK and a FIN ACK packet with a bad TCP T...
CVE-2019-18792
- EPSS 0.18%
- Veröffentlicht 06.01.2020 18:15:23
- Zuletzt bearbeitet 21.11.2024 04:33:34
An issue was discovered in Suricata 5.0.0. It is possible to bypass/evade any tcp based signature by overlapping a TCP segment with a fake FIN packet. The fake FIN packet is injected just before the PUSH ACK packet we want to bypass. The PUSH ACK pac...
CVE-2019-1010279
- EPSS 0.19%
- Veröffentlicht 18.07.2019 19:15:11
- Zuletzt bearbeitet 21.11.2024 04:18:07
Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The com...