Total
21 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-11899 | 2 Dell, Treck | 7 Wyse 5030, Wyse 5030 Firmware, Wyse 5050 All-in-one and 4 more | 2024-07-24 | 4.8 MEDIUM | 5.4 MEDIUM |
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read. | |||||
CVE-2020-10136 | 4 Cisco, Digi, Hp and 1 more | 63 Nexus 1000v, Nexus 1000ve, Nexus 3016 and 60 more | 2024-06-17 | 5.0 MEDIUM | 5.3 MEDIUM |
IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing. | |||||
CVE-2020-25066 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
A heap-based buffer overflow in the Treck HTTP Server component before 6.0.1.68 allows remote attackers to cause a denial of service (crash/reset) or to possibly execute arbitrary code. | |||||
CVE-2020-11904 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 7.5 HIGH | 7.3 HIGH |
The Treck TCP/IP stack before 6.0.1.66 has an Integer Overflow during Memory Allocation that causes an Out-of-Bounds Write. | |||||
CVE-2020-11909 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
The Treck TCP/IP stack before 6.0.1.66 has an IPv4 Integer Underflow. | |||||
CVE-2020-11901 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 9.3 HIGH | 9.0 CRITICAL |
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response. | |||||
CVE-2020-11902 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 7.5 HIGH | 7.3 HIGH |
The Treck TCP/IP stack before 6.0.1.66 has an IPv6OverIPv4 tunneling Out-of-bounds Read. | |||||
CVE-2020-11908 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 3.3 LOW | 4.3 MEDIUM |
The Treck TCP/IP stack before 4.7.1.27 mishandles '\0' termination in DHCP. | |||||
CVE-2020-11910 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
The Treck TCP/IP stack before 6.0.1.66 has an ICMPv4 Out-of-bounds Read. | |||||
CVE-2020-11905 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 3.3 LOW | 6.5 MEDIUM |
The Treck TCP/IP stack before 6.0.1.66 has a DHCPv6 Out-of-bounds Read. | |||||
CVE-2020-11900 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 6.4 MEDIUM | 8.2 HIGH |
The Treck TCP/IP stack before 6.0.1.41 has an IPv4 tunneling Double Free. | |||||
CVE-2020-11897 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 10.0 HIGH | 10.0 CRITICAL |
The Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets. | |||||
CVE-2020-11914 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 3.3 LOW | 4.3 MEDIUM |
The Treck TCP/IP stack before 6.0.1.66 has an ARP Out-of-bounds Read. | |||||
CVE-2020-11898 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 6.4 MEDIUM | 9.1 CRITICAL |
The Treck TCP/IP stack before 6.0.1.66 improperly handles an IPv4/ICMPv4 Length Parameter Inconsistency, which might allow remote attackers to trigger an information leak. | |||||
CVE-2020-11906 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 5.8 MEDIUM | 6.3 MEDIUM |
The Treck TCP/IP stack before 6.0.1.66 has an Ethernet Link Layer Integer Underflow. | |||||
CVE-2020-11896 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 9.3 HIGH | 10.0 CRITICAL |
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling. | |||||
CVE-2020-11903 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 3.3 LOW | 6.5 MEDIUM |
The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read. | |||||
CVE-2020-11907 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 5.8 MEDIUM | 6.3 MEDIUM |
The Treck TCP/IP stack before 6.0.1.66 improperly handles a Length Parameter Inconsistency in TCP. | |||||
CVE-2020-11911 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
The Treck TCP/IP stack before 6.0.1.66 has Improper ICMPv4 Access Control. | |||||
CVE-2020-11913 | 1 Treck | 1 Tcp\/ip | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read. |