2 results (0.001 seconds)

CVSS: 5.0EPSS: 2%CPEs: 50EXPL: 2

DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information. DHCP en los encaminadores de cable y ADSL Linksys BEFSR11, BEFSR41, BEFSR81 y BEFSRU31, con versión de firmware 1.45.7, no limpia adecuadamente búferes usados anteriormente en un paquete de respueta BOOTP, lo que permite a atacantes remotos obtener información sensible. • https://www.exploit-db.com/exploits/24115 http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832&p_%20%5Ccreated=1086294093&p_sid=pU1X1idh&p_lva=&p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20%5CJnBfcm93X2NudD02NTQmcF9wYWdlPTE%2A&p_li= http://marc.info/?l=bugtraq&m=108662876129301&w=2 http://secunia.com/advisories/11606 http://securitytracker.com/alerts/2004/May/1010288.html http://www.osvdb.org/6325 http://www.securityfocus.com/bid/10329 https://exchange& •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

VPN Server module in Linksys EtherFast BEFVP41 Cable/DSL VPN Router before 1.40.1 reduces the key lengths for keys that are supplied via manual key entry, which makes it easier for attackers to crack the keys. • ftp://ftp.linksys.com/pub/befsr41/befvp41-1402.zip http://online.securityfocus.com/archive/1/260613 http://www.iss.net/security_center/static/8397.php http://www.securityfocus.com/bid/4250 •