2 results (0.004 seconds)

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

3Com Switch SS3 4400 switches, firmware 5.11, 6.00 and 6.10 and earlier, allow remote attackers to read the SNMP Read-Write Community string and conduct unauthorized actions via unspecified "normally restricted management packets on the device" that cause the community string to be returned. El firmware de los conmutadores de 3Com Switch SS3 4400, versiones 5.11, 6.00, 6.10 y anteriores, permite a atacantes remotos la lectura de la cadena SNMP Read-Write Community y realizar acciones no autorizadas mediante paquetes de gestión normalmente restringidos en el dispositivo, que provocan que la cadena community sea devuelta. • http://secunia.com/advisories/22818 http://securitytracker.com/id?1017128 http://www.3com.com/securityalert/alerts/3COM-06-004.html http://www.securityfocus.com/bid/20736 http://www.vupen.com/english/advisories/2006/4184 https://exchange.xforce.ibmcloud.com/vulnerabilities/29779 •

CVSS: 7.1EPSS: 96%CPEs: 4EXPL: 0

Unspecified vulnerability in 3Com SuperStack 3 4400 switches with firmware version before 3.31 allows remote attackers to cause a denial of service (device reset) via a crafted request to the web management interface. NOTE: the provenance of this information is unknown; details are obtained from third party reports. • http://secunia.com/advisories/11934 http://www.osvdb.org/7246 https://exchange.xforce.ibmcloud.com/vulnerabilities/16497 •