|ID||CVSS||Summary||Last (major) update||Published|
Untrusted search path vulnerability in Snort 126.96.36.199-WIN32 allows remote attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse tcapi.dll that is located in the same folder on a remote file share as a pcap file that
|27-01-2017 - 13:25||23-01-2017 - 16:59|
Buffer overflow in the RPC preprocessor for Snort 1.8 and 1.9.x before 1.9.1 allows remote attackers to execute arbitrary code via fragmented RPC packets.
|17-10-2016 - 22:28||07-03-2003 - 00:00|
Various Intrusion Detection Systems (IDS) including (1) Cisco Secure Intrusion Detection System, (2) Cisco Catalyst 6000 Intrusion Detection System Module, (3) Dragon Sensor 4.x, (4) Snort before 1.8.1, (5) ISS RealSecure Network Sensor 5.x and 6.x b
|17-10-2016 - 22:11||30-10-2001 - 00:00|
Snort before 188.8.131.52, when the -v option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted IPv6 packet that uses the (1) TCP or (2) ICMP protocol.
|15-07-2013 - 01:57||28-10-2009 - 10:30|
preprocessors/spp_frag3.c in Sourcefire Snort before 2.8.1 does not properly identify packet fragments that have dissimilar TTL values, which allows remote attackers to bypass detection rules by using a different TTL for each fragment.
|07-03-2011 - 22:07||22-05-2008 - 09:09|
Integer underflow in the DecodeGRE function in src/decode.c in Snort 184.108.40.206 allows remote attackers to trigger dereferencing of certain memory locations via crafted GRE packets, which may cause corruption of log files or writing of sensitive informa
|07-03-2011 - 21:49||16-01-2007 - 18:28|
Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 220.127.116.11, and 2.7 before beta 2; and Sourcefire Intrusion Sensor; allows remote attackers to execute arbitrary code via crafted SMB traffic.
|07-03-2011 - 21:42||19-02-2007 - 20:28|
Algorithmic complexity vulnerability in Snort before 2.6.1, during predicate evaluation in rule matching for certain rules, allows remote attackers to cause a denial of service (CPU consumption and detection outage) via crafted network traffic, aka a
|15-09-2010 - 01:37||16-01-2007 - 18:28|
The frag3 preprocessor in Snort 18.104.22.168, 22.214.171.124, and 2.7.0 beta, when configured for inline use on Linux without the ip_conntrack module loaded, allows remote attackers to cause a denial of service (segmentation fault and application crash) via cert
|05-09-2008 - 17:20||10-03-2007 - 17:19|
Unknown vulnerability in IP defragmenter (frag2) in Snort before 1.8.3 allows attackers to cause a denial of service (crash).
|05-09-2008 - 16:26||31-12-2001 - 00:00|
Snort 1.6, when running in straight ASCII packet logging mode or IDS mode with straight decoded ASCII packet logging selected, allows remote attackers to cause a denial of service (crash) by sending non-IP protocols that Snort does not know about, as
|05-09-2008 - 16:22||31-12-2000 - 00:00|