Vulnerabilities > Treck > TCP IP > 5.0.1.35

DATE CVE VULNERABILITY TITLE RISK
2020-06-17 CVE-2020-11904 Integer Overflow or Wraparound vulnerability in Treck Tcp/Ip
The Treck TCP/IP stack before 6.0.1.66 has an Integer Overflow during Memory Allocation that causes an Out-of-Bounds Write.
network
low complexity
treck CWE-190
7.5
2020-06-17 CVE-2020-11903 Out-of-bounds Read vulnerability in Treck Tcp/Ip 4.7.1.27/5.0.1.35
The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.
low complexity
treck CWE-125
3.3
2020-06-17 CVE-2020-11902 Out-of-bounds Read vulnerability in Treck Tcp/Ip
The Treck TCP/IP stack before 6.0.1.66 has an IPv6OverIPv4 tunneling Out-of-bounds Read.
network
low complexity
treck CWE-125
7.5
2020-06-17 CVE-2020-11901 Improper Input Validation vulnerability in Treck Tcp/Ip
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.
network
treck CWE-20
critical
9.3
2020-06-17 CVE-2020-11900 Double Free vulnerability in Treck Tcp/Ip 4.7.1.27/5.0.1.35/6.0.1.28
The Treck TCP/IP stack before 6.0.1.41 has an IPv4 tunneling Double Free.
network
low complexity
treck CWE-415
6.4
2020-06-17 CVE-2020-11899 Out-of-bounds Read vulnerability in Treck Tcp/Ip
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
low complexity
treck CWE-125
4.8
2020-06-17 CVE-2020-11898 Information Exposure vulnerability in Treck Tcp/Ip
The Treck TCP/IP stack before 6.0.1.66 improperly handles an IPv4/ICMPv4 Length Parameter Inconsistency, which might allow remote attackers to trigger an information leak.
network
low complexity
treck CWE-200
6.4
2020-06-17 CVE-2020-11896 Improper Input Validation vulnerability in Treck Tcp/Ip
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.
network
treck CWE-20
critical
9.3
2020-06-02 CVE-2020-10136 Authentication Bypass by Spoofing vulnerability in multiple products
Multiple products that implement the IP Encapsulation within IP standard (RFC 2003, STD 1) decapsulate and route IP-in-IP traffic without any validation, which could allow an unauthenticated remote attacker to route arbitrary traffic via an exposed network interface and lead to spoofing, access control bypass, and other unexpected network behaviors.
network
low complexity
cisco digi hp treck CWE-290
5.0