2 results (0.004 seconds)

CVSS: 5.0EPSS: 2%CPEs: 50EXPL: 2

DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information. DHCP en los encaminadores de cable y ADSL Linksys BEFSR11, BEFSR41, BEFSR81 y BEFSRU31, con versión de firmware 1.45.7, no limpia adecuadamente búferes usados anteriormente en un paquete de respueta BOOTP, lo que permite a atacantes remotos obtener información sensible. • https://www.exploit-db.com/exploits/24115 http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832&p_%20%5Ccreated=1086294093&p_sid=pU1X1idh&p_lva=&p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20%5CJnBfcm93X2NudD02NTQmcF9wYWdlPTE%2A&p_li= http://marc.info/?l=bugtraq&m=108662876129301&w=2 http://secunia.com/advisories/11606 http://securitytracker.com/alerts/2004/May/1010288.html http://www.osvdb.org/6325 http://www.securityfocus.com/bid/10329 https://exchange& •

CVSS: 5.0EPSS: 4%CPEs: 4EXPL: 2

The remote management web server for Linksys BEFSR41 EtherFast Cable/DSL Router before firmware 1.42.7 allows remote attackers to cause a denial of service (crash) via an HTTP request to Gozila.cgi without any arguments. El servidor de adminsitración web remota del router Linksys BEFSR41 EtherFast Cable/DSL con firmware anterior a 1.42.7 permite a atacantes remotos causar una denegación de servicio (caída) mediante una petición HTTP a Gozilla.cgi sin argumentos. • https://www.exploit-db.com/exploits/21975 http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0049.html http://marc.info/?l=bugtraq&m=103616324103171&w=2 http://www.idefense.com/advisory/10.31.02a.txt http://www.iss.net/security_center/static/10514.php http://www.securityfocus.com/bid/6086 •