Filtered by vendor Sourcefire
Subscriptions
Total
8 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2010-2306 | 1 Sourcefire | 4 3d1000, 3d2000, 3d9900 and 1 more | 2024-11-21 | N/A |
The default installation of Sourcefire 3D Sensor 1000, 2000, and 9900; and Defense Center 1000; uses the same static, private SSL keys for multiple devices and installations, which allows remote attackers to decrypt SSL traffic via a man-in-the-middle (MITM) attack. | ||||
CVE-2009-2344 | 1 Sourcefire | 2 3d Sensor, Defense Center | 2024-11-21 | N/A |
The web-based management interfaces in Sourcefire Defense Center (DC) and 3D Sensor before 4.8.2 allow remote authenticated users to gain privileges via a $admin value for the admin parameter in an edit action to admin/user/user.cgi and unspecified other components. | ||||
CVE-2006-5276 | 2 Snort, Sourcefire | 2 Snort, Intrusion Sensor | 2024-11-21 | N/A |
Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 before beta 2; and Sourcefire Intrusion Sensor; allows remote attackers to execute arbitrary code via crafted SMB traffic. | ||||
CVE-2006-2769 | 1 Sourcefire | 1 Snort | 2024-11-21 | N/A |
The HTTP Inspect preprocessor (http_inspect) in Snort 2.4.0 through 2.4.4 allows remote attackers to bypass "uricontent" rules via a carriage return (\r) after the URL and before the HTTP declaration. | ||||
CVE-2006-0839 | 1 Sourcefire | 1 Snort | 2024-11-21 | N/A |
The frag3 preprocessor in Sourcefire Snort 2.4.3 does not properly reassemble certain fragmented packets with IP options, which allows remote attackers to evade detection of certain attacks, possibly related to IP option lengths. | ||||
CVE-2005-3252 | 1 Sourcefire | 1 Snort | 2024-11-21 | N/A |
Stack-based buffer overflow in the Back Orifice (BO) preprocessor for Snort before 2.4.3 allows remote attackers to execute arbitrary code via a crafted UDP packet. | ||||
CVE-2004-2652 | 1 Sourcefire | 1 Snort | 2024-11-21 | N/A |
The DecodeTCPOptions function in decode.c in Snort before 2.3.0, when printing TCP/IP options using FAST output or verbose mode, allows remote attackers to cause a denial of service (crash) via packets with invalid TCP/IP options, which trigger a null dereference. | ||||
CVE-2003-0209 | 2 Smoothwall, Sourcefire | 2 Smoothwall, Snort | 2024-11-21 | N/A |
Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow. |
Page 1 of 1.