The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of ROX

Siemens RUGGEDCOM RM1224: denial of service via Failed SSH Authentication
An attacker can trigger a fatal error via Failed SSH Authentication of Siemens RUGGEDCOM RM1224, in order to trigger a denial of service...
CERTFR-2021-AVI-176, CVE-2021-25676, SSA-296266, VIGILANCE-VUL-34784
DNS: Man-in-the-Middle via SAD DNS ICMP Rate
An attacker can act as a Man-in-the-Middle via ICMP Rate on DNS, in order to read or write data in the session...
ARUBA-PSA-2021-008, CERTFR-2020-AVI-750, CERTFR-2020-AVI-764, CERTFR-2020-AVI-769, CERTFR-2020-AVI-776, CERTFR-2020-AVI-784, CERTFR-2020-AVI-786, CERTFR-2020-AVI-811, CERTFR-2020-AVI-834, CERTFR-2021-AVI-006, CERTFR-2021-AVI-122, CERTFR-2021-AVI-158, CERTFR-2021-AVI-183, CERTFR-2021-AVI-184, CERTFR-2021-AVI-201, CERTFR-2021-AVI-357, CERTFR-2021-AVI-371, CERTFR-2021-AVI-451, CVE-2020-25705, DLA-2483-1, DLA-2494-1, HPESBNW04111, K09604370, openSUSE-SU-2020:2034-1, openSUSE-SU-2020:2112-1, openSUSE-SU-2020:2161-1, openSUSE-SU-2021:0242-1, RHSA-2021:0537-01, RHSA-2021:0558-01, RHSA-2021:0686-01, RHSA-2021:0765-01, RHSA-2021:0774-01, RHSA-2021:0856-01, RHSA-2021:0857-01, RHSA-2021:1531-01, RHSA-2021:2164-01, RHSA-2021:2355-01, SAD DNS, SSA-324955, SSB-439005, SUSE-SU-2020:3326-1, SUSE-SU-2020:3484-1, SUSE-SU-2020:3491-1, SUSE-SU-2020:3501-1, SUSE-SU-2020:3503-1, SUSE-SU-2020:3507-1, SUSE-SU-2020:3512-1, SUSE-SU-2020:3513-1, SUSE-SU-2020:3522-1, SUSE-SU-2020:3532-1, SUSE-SU-2020:3544-1, SUSE-SU-2020:3717-1, SUSE-SU-2020:3764-1, USN-4657-1, USN-4658-1, USN-4658-2, USN-4659-1, USN-4659-2, USN-4680-1, VIGILANCE-VUL-33901
libreswan: denial of service via IKE v1
An attacker can send malicious IKE v1 packets to libreswan, in order to trigger a denial of service...
CVE-2020-1763, DSA-4684-1, RHSA-2020:2069-01, RHSA-2020:2070-01, RHSA-2020:2071-01, SSA-379803, VIGILANCE-VUL-32237
Mozilla NSS: buffer overflow via Cryptographic Primitives
An attacker can trigger a buffer overflow via Cryptographic Primitives of Mozilla NSS, in order to trigger a denial of service, and possibly to run code...
6403293, CVE-2019-17006, DLA-2058-1, DLA-2388-1, DSA-2020-066, DSA-2020-067, DSA-4726-1, JSA11174, JSA11176, openSUSE-SU-2020:0008-1, openSUSE-SU-2020:0854-1, RHSA-2020:3280-01, RHSA-2020:4076-01, RHSA-2021:0758-01, RHSA-2021:0876-01, RHSA-2021:1026-01, SSA-379803, SUSE-SU-2019:3395-1, SUSE-SU-2020:14418-1, SUSE-SU-2020:1677-1, SUSE-SU-2020:1839-1, USN-4231-1, VIGILANCE-VUL-31248
Mozilla NSS: buffer overflow via NSC_EncryptUpdate
An attacker can trigger a buffer overflow via NSC_EncryptUpdate() of Mozilla NSS, in order to trigger a denial of service, and possibly to run code...
CVE-2019-11745, DLA-2008-1, DLA-2388-1, DSA-4579-1, FEDORA-2019-3f6ab3b846, FEDORA-2019-8fbc65ef9e, JSA11110, JSA11174, JSA11176, MFSA-2019-36, MFSA-2019-37, MFSA-2019-38, openSUSE-SU-2020:0002-1, openSUSE-SU-2020:0003-1, openSUSE-SU-2020:0008-1, RHSA-2019:4114-01, RHSA-2019:4152-01, RHSA-2019:4190-01, RHSA-2020:0243-01, RHSA-2020:0466-01, RHSA-2020:1267-01, RHSA-2020:1345-01, RHSA-2020:1461-01, SSA:2019-337-01, SSA-379803, SUSE-SU-2019:14260-1, SUSE-SU-2019:3337-1, SUSE-SU-2019:3339-1, SUSE-SU-2019:3347-1, SUSE-SU-2019:3395-1, SUSE-SU-2020:14418-1, USN-4203-1, USN-4203-2, USN-4216-1, USN-4241-1, VIGILANCE-VUL-30971
Linux kernel: denial of service via TCP SACK Low MSS Panic
An attacker can send malicious TCP SACK Low MSS Panic packets to Linux kernel, in order to trigger a denial of service...
1074268, 1442037, ARUBA-PSA-2020-010, CERTFR-2019-AVI-276, CERTFR-2019-AVI-277, CERTFR-2019-AVI-278, CERTFR-2019-AVI-298, CERTFR-2019-AVI-303, CERTFR-2019-AVI-309, CERTFR-2019-AVI-429, CERTFR-2019-AVI-458, CERTFR-2019-AVI-561, CERTFR-2019-AVI-597, CERTFR-2020-AVI-575, cpujan2020, CTX256725, CVE-2019-11477, DLA-1823-1, DLA-1824-1, DSA-2019-117, DSA-4465-1, FEDORA-2019-6c3d89b3d0, FEDORA-2019-914542e05c, FG-IR-19-180, K78234183, openSUSE-SU-2019:1570-1, openSUSE-SU-2019:1571-1, openSUSE-SU-2019:1579-1, PAN-SA-2019-0013, RHSA-2019:1479-01, RHSA-2019:1480-01, RHSA-2019:1481-01, RHSA-2019:1482-01, RHSA-2019:1483-01, RHSA-2019:1484-01, RHSA-2019:1485-01, RHSA-2019:1486-01, RHSA-2019:1487-01, RHSA-2019:1488-01, RHSA-2019:1489-01, RHSA-2019:1490-01, RHSA-2019:1602-01, SA44193, SB10287, sk156192, SSA-462066, SSB-439005, SUSE-SU-2019:14089-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1529-1, SUSE-SU-2019:1530-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1533-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1535-1, SUSE-SU-2019:1536-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1692-1, SUSE-SU-2019:2430-1, SUSE-SU-2019:2450-1, SUSE-SU-2019:2950-1, SYMSA1492, Synology-SA-19:28, USN-4017-1, USN-4017-2, VIGILANCE-VUL-29543, VMSA-2019-0010, VMSA-2019-0010.1, VU#905115
Linux kernel: denial of service via TCP SACK Low MSS Resource
An attacker can trigger a fatal error via TCP SACK Low MSS Resource of the Linux kernel, in order to trigger a denial of service...
1074268, 6365341, ARUBA-PSA-2020-010, CERTFR-2019-AVI-277, CERTFR-2019-AVI-278, CERTFR-2019-AVI-298, CERTFR-2019-AVI-300, CERTFR-2019-AVI-429, CERTFR-2019-AVI-458, CERTFR-2019-AVI-597, CERTFR-2020-AVI-575, CERTFR-2021-AVI-146, cpujan2020, CVE-2019-11479, DLA-1823-1, DLA-1824-1, DSA-2019-117, DSA-4465-1, FEDORA-2019-6c3d89b3d0, FEDORA-2019-914542e05c, FG-IR-19-180, HPESBST04140, K35421172, openSUSE-SU-2019:1570-1, openSUSE-SU-2019:1571-1, openSUSE-SU-2019:1579-1, PAN-SA-2019-0013, RHSA-2019:1479-01, RHSA-2019:1480-01, RHSA-2019:1481-01, RHSA-2019:1482-01, RHSA-2019:1483-01, RHSA-2019:1484-01, RHSA-2019:1485-01, RHSA-2019:1486-01, RHSA-2019:1487-01, RHSA-2019:1488-01, RHSA-2019:1489-01, RHSA-2019:1490-01, RHSA-2019:1602-01, SA44193, SB10287, sk156192, SSA-462066, SSB-439005, SUSE-SU-2019:14089-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1529-1, SUSE-SU-2019:1530-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1533-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1535-1, SUSE-SU-2019:1536-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1692-1, SUSE-SU-2019:2430-1, SYMSA1492, Synology-SA-19:28, USN-4041-1, USN-4041-2, VIGILANCE-VUL-29546, VU#905115
Linux kernel: denial of service via TCP SACK Fragmented Retransmission Queue
An attacker can trigger a fatal error via TCP SACK Fragmented Retransmission Queue of the Linux kernel, in order to trigger a denial of service...
1074268, ARUBA-PSA-2020-010, CERTFR-2019-AVI-276, CERTFR-2019-AVI-277, CERTFR-2019-AVI-278, CERTFR-2019-AVI-298, CERTFR-2019-AVI-303, CERTFR-2019-AVI-309, CERTFR-2019-AVI-337, CERTFR-2019-AVI-429, CERTFR-2019-AVI-458, CERTFR-2019-AVI-597, CERTFR-2020-AVI-575, cpujan2020, CTX256725, CVE-2019-11478, DLA-1823-1, DLA-1824-1, DSA-2019-117, DSA-4465-1, FEDORA-2019-6c3d89b3d0, FEDORA-2019-914542e05c, FG-IR-19-180, K26618426, openSUSE-SU-2019:1570-1, openSUSE-SU-2019:1571-1, openSUSE-SU-2019:1579-1, PAN-SA-2019-0013, RHSA-2019:1479-01, RHSA-2019:1480-01, RHSA-2019:1481-01, RHSA-2019:1482-01, RHSA-2019:1483-01, RHSA-2019:1484-01, RHSA-2019:1485-01, RHSA-2019:1486-01, RHSA-2019:1487-01, RHSA-2019:1488-01, RHSA-2019:1489-01, RHSA-2019:1490-01, RHSA-2019:1602-01, SA44193, SB10287, sk156192, SSA-462066, SSB-439005, SUSE-SU-2019:14089-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1529-1, SUSE-SU-2019:1530-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1533-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1535-1, SUSE-SU-2019:1536-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1692-1, SUSE-SU-2019:1851-1, SUSE-SU-2019:1855-1, SUSE-SU-2019:2430-1, SUSE-SU-2019:2450-1, SYMSA1492, Synology-SA-19:28, USN-4017-1, USN-4017-2, VIGILANCE-VUL-29544, VMSA-2019-0010, VMSA-2019-0010.1, VU#905115
RuggedCom ROX: multiple vulnerabilities
An attacker can use several vulnerabilities of RuggedCom ROX...
VIGILANCE-VUL-28841
Mozilla NSS: NULL pointer dereference via CERT_DecodeCertPackage
An attacker can force a NULL pointer to be dereferenced via CERT_DecodeCertPackage() of Mozilla NSS, in order to trigger a denial of service...
1798, CVE-2019-17007, DLA-2015-1, DLA-2388-1, DSA-4579-1, FEDORA-2019-481a343318, RHSA-2021:0876-01, SSA-379803, USN-4215-1, VIGILANCE-VUL-28825
Our database contains other pages. You can request a free trial to read them.

Display information about ROX: