5 results (0.009 seconds)

CVSS: 7.5EPSS: 3%CPEs: 4EXPL: 0

Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 has two template HTML files lacking certain verification tags, which allows remote attackers to access the administration interface and change the device configuration via certain requests. Nortel VPN Router (también conocido como Contivity) 1000, 2000, 4000, y 5000 anterior a 5_05.149, 5_05.3xx anterior 5_05.304, y 6.x anterior 6_05.140 tiene dos archivos de plantilla html que carecen de ciertas etiquetas de verificación, lo cual podría permitir a atacantes remotos acceder a la interfaz de administrador y cambiar los controladores de configuración a través de ciertas respuestas. • http://osvdb.org/35056 http://secunia.com/advisories/24962 http://www.securityfocus.com/bid/23562 http://www.securitytracker.com/id?1017943 http://www.vupen.com/english/advisories/2007/1464 http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=567877&RenditionID=&poid=null •

CVSS: 9.0EPSS: 0%CPEs: 8EXPL: 0

Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 6_05.140 uses a fixed DES key to encrypt passwords, which allows remote authenticated users to obtain a password via a brute force attack on a hash from the LDAP store. Nortel VPN Router (también conocido como Contivity) 1000, 2000, 4000, y 5000 anterior a 6_05.140 utiliza una llave DES para encriptar contraseñas, lo cual permite a usuarios remotos validados obtener una contraseña a través de ataques por fuerza bruta sobre un hash desde el LDAP almacenado. • http://secunia.com/advisories/24962 http://www.securityfocus.com/bid/23562 http://www.vupen.com/english/advisories/2007/1464 http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=567877&RenditionID=&poid=null •

CVSS: 10.0EPSS: 1%CPEs: 5EXPL: 0

Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 includes the FIPSecryptedtest1219 and FIPSunecryptedtest1219 default accounts in the LDAP template, which might allow remote attackers to access the private network. Nortel VPN Router (también conocido como Contivity) 1000, 2000, 4000, y 5000 anterior a 5_05.149, 5_05.3xx anterior 5_05.304, y 6.x anterior 6_05.140 incluyen las cuentas por defecto FIPSecryptedtest1219 y FIPSunecryptedtest1219 en la plantilla LDAP, lo cual podría permitir a atacantes remotos acceder a la red privada. • http://osvdb.org/35055 http://secunia.com/advisories/24962 http://www.securityfocus.com/bid/23562 http://www.securitytracker.com/id?1017943 http://www.vupen.com/english/advisories/2007/1464 http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=567877&RenditionID=&poid=null •

CVSS: 5.0EPSS: 93%CPEs: 296EXPL: 2

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64/SCOSA-2005.64.txt http://secunia.com/advisories/15393 http://secunia.com/advisories/15417 http://secunia.com/advisories/18222 http://secunia.com/advisories/18662 http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml http:/& •

CVSS: 5.0EPSS: 1%CPEs: 17EXPL: 0

Nortel VPN Router (aka Contivity) allows remote attackers to cause a denial of service (crash) via an IPsec IKE packet with a malformed ISAKMP header. • http://securitytracker.com/id?1014068 http://www.nta-monitor.com/news/vpn-flaws/nortel/vpn-router-dos http://www.securityfocus.com/archive/1/399423 http://www.securityfocus.com/bid/13792 •