Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
suricata vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2023-35853
In Suricata prior to 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section.
Oisf Suricata
9.8
CVSSv3
CVE-2021-37592
Suricata prior to 5.0.8 and 6.x prior to 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.
Oisf Suricata
9.8
CVSSv3
CVE-2019-16411
An issue exists in Suricata 4.1.4. By sending multiple IPv4 packets that have invalid IPv4Options, the function IPV4OptValidateTimestamp in decode-ipv4.c tries to access a memory region that is not allocated. There is a check for o->len < 5 (corresponding to 2 bytes of head...
Suricata-ids Suricata 4.1.4
9.8
CVSSv3
CVE-2019-10053
An issue exists in Suricata 4.1.x prior to 4.1.4. If the input of the function SSHParseBanner is composed only of a \n character, then the program runs into a heap-based buffer over-read. This occurs because the erroneous search for \r results in an integer underflow.
Suricata-ids Suricata
9.8
CVSSv3
CVE-2018-10244
Suricata version 4.0.4 incorrectly handles the parsing of an EtherNet/IP PDU. A malformed PDU can cause the parsing code to read beyond the allocated data because DecodeENIPPDU in app-layer-enip-commmon.c has an integer overflow during a length check.
Suricata-ids Suricata 4.0.4
9.8
CVSSv3
CVE-2015-8954
The MemcmpLowercase function in Suricata prior to 2.0.6 improperly excludes the first byte from comparisons, which might allow remote malicious users to bypass intrusion-prevention functionality via a crafted HTTP request.
Openinfosecfoundation Suricata
9.1
CVSSv3
CVE-2019-18792
An issue exists in Suricata 5.0.0. It is possible to bypass/evade any tcp based signature by overlapping a TCP segment with a fake FIN packet. The fake FIN packet is injected just before the PUSH ACK packet we want to bypass. The PUSH ACK packet (containing the data) will be igno...
Suricata-ids Suricata
Suricata-ids Suricata 5.0.0
Debian Debian Linux 8.0
9.1
CVSSv3
CVE-2019-15699
An issue exists in app-layer-ssl.c in Suricata 4.1.4. Upon receiving a corrupted SSLv3 (TLS 1.2) packet, the parser function TLSDecodeHSHelloExtensions tries to access a memory region that is not allocated, because the expected length of HSHelloExtensions does not match the real ...
Suricata-ids Suricata 4.1.4
9.1
CVSSv3
CVE-2019-16410
An issue exists in Suricata 4.1.4. By sending multiple fragmented IPv4 packets, the function Defrag4Reassemble in defrag.c tries to access a memory region that is not allocated, because of a lack of header_len checking.
Suricata-ids Suricata 4.1.4
7.8
CVSSv3
CVE-2018-1000167
OISF suricata-update version 1.0.0a1 contains an Insecure Deserialization vulnerability in the insecure yaml.load-Function as used in the following files: config.py:136, config.py:142, sources.py:99 and sources.py:131. The "list-sources"-command is affected by this bug....
Oisf Suricata-update 1.0.0a1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »