Vulnerabilities > Protection Mechanism Failure

DATE CVE VULNERABILITY TITLE RISK
2018-04-19 CVE-2018-0244 Protection Mechanism Failure vulnerability in Cisco Firepower Threat Defense
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a configured file action policy to drop the Server Message Block (SMB) protocol if a malware file is detected.
network
low complexity
cisco CWE-693
5.8
2018-04-19 CVE-2018-0243 Protection Mechanism Failure vulnerability in Cisco Firepower Threat Defense
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a configured file action policy that is intended to drop the Server Message Block Version 2 (SMB2) and SMB Version 3 (SMB3) protocols if malware is detected.
network
low complexity
cisco CWE-693
5.8
2018-02-08 CVE-2018-0138 Protection Mechanism Failure vulnerability in Cisco Firepower Threat Defense
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass file policies that are configured to block files transmitted to an affected device via the BitTorrent protocol.
network
low complexity
cisco CWE-693
5.3
2018-02-07 CVE-2018-6794 Protection Mechanism Failure vulnerability in multiple products
Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c.
network
low complexity
suricata-ids debian CWE-693
5.3
2017-11-22 CVE-2017-8864 Protection Mechanism Failure vulnerability in Cohuhd 3960Hd Firmware
Client-side enforcement using JavaScript of server-side security options on the Cohu 3960HD allows an attacker to manipulate options sent to the camera and cause malfunction or code execution, as demonstrated by a client-side "if (!passwordsAreEqual())" test.
network
low complexity
cohuhd CWE-693
critical
9.8
2016-09-02 CVE-2016-0772 Protection Mechanism Failure vulnerability in Python
The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
network
high complexity
python CWE-693
6.5