CVE-2020-19678
- EPSS 0.23%
- Veröffentlicht 06.04.2023 18:15:08
- Zuletzt bearbeitet 12.02.2025 16:15:31
Directory Traversal vulnerability found in Pfsense v.2.1.3 and Pfsense Suricata v.1.4.6 pkg v.1.0.1 allows a remote attacker to obtain sensitive information via the file parameter to suricata/suricata_logs_browser.php.
CVE-2021-45098
- EPSS 0.65%
- Veröffentlicht 16.12.2021 05:15:08
- Zuletzt bearbeitet 03.11.2025 20:15:51
An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to injec...
CVE-2021-37592
- EPSS 0.14%
- Veröffentlicht 19.11.2021 15:15:08
- Zuletzt bearbeitet 21.11.2024 06:15:28
Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.
CVE-2021-35063
- EPSS 1.08%
- Veröffentlicht 22.07.2021 18:15:23
- Zuletzt bearbeitet 21.11.2024 06:11:46
Suricata before 5.0.7 and 6.x before 6.0.3 has a "critical evasion."
CVE-2019-18625
- EPSS 0.25%
- Veröffentlicht 06.01.2020 21:15:11
- Zuletzt bearbeitet 21.11.2024 04:33:23
An issue was discovered in Suricata 5.0.0. It was possible to bypass/evade any tcp based signature by faking a closed TCP session using an evil server. After the TCP SYN packet, it is possible to inject a RST ACK and a FIN ACK packet with a bad TCP T...
CVE-2019-18792
- EPSS 0.18%
- Veröffentlicht 06.01.2020 18:15:23
- Zuletzt bearbeitet 21.11.2024 04:33:34
An issue was discovered in Suricata 5.0.0. It is possible to bypass/evade any tcp based signature by overlapping a TCP segment with a fake FIN packet. The fake FIN packet is injected just before the PUSH ACK packet we want to bypass. The PUSH ACK pac...
CVE-2019-1010279
- EPSS 0.19%
- Veröffentlicht 18.07.2019 19:15:11
- Zuletzt bearbeitet 21.11.2024 04:18:07
Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The com...
CVE-2019-1010251
- EPSS 0.4%
- Veröffentlicht 18.07.2019 18:15:12
- Zuletzt bearbeitet 21.11.2024 04:18:05
Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-lay...
CVE-2019-10050
- EPSS 0.54%
- Veröffentlicht 13.05.2019 17:29:02
- Zuletzt bearbeitet 21.11.2024 04:18:17
A buffer over-read issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the decode-mpls.c function DecodeMPLS is composed only of a packet of source address and destination address plus the correct type field and the right number for ...
CVE-2018-10244
- EPSS 0.67%
- Veröffentlicht 04.04.2019 16:29:00
- Zuletzt bearbeitet 21.11.2024 03:41:05
Suricata version 4.0.4 incorrectly handles the parsing of an EtherNet/IP PDU. A malformed PDU can cause the parsing code to read beyond the allocated data because DecodeENIPPDU in app-layer-enip-commmon.c has an integer overflow during a length check...