Page 12 of 68 results (0.017 seconds)

CVSS: 10.0EPSS: 26%CPEs: 1EXPL: 1

Heap-based buffer overflow in the viewer ActiveX control in Sony Network Camera SNC-RZ25N before 1.30; SNC-P1 and SNC-P5 before 1.29; SNC-CS10 and SNC-CS11 before 1.06; SNC-DF40N and SNC-DF70N before 1.18; SNC-RZ50N and SNC-CS50N before 2.22; SNC-DF85N, SNC-DF80N, and SNC-DF50N before 1.12; and SNC-RX570N/W, SNC-RX570N/B, SNC-RX550N/W, SNC-RX550N/B, SNC-RX530N/W, and SNC-RX530N/B 3.00 and 2.x before 2.31; allows remote attackers to execute arbitrary code via a long first argument to the PrmSetNetworkParam method. Desbordamiento de búfer basado en pila en el control ActiveX view de Sony Network Camera SNC-P5 1.0 permite a atacantes remotos tener impacto desconocido mediante un primer argumento largo al método PrmSetNetworkParam. • https://www.exploit-db.com/exploits/4120 http://jvn.jp/en/jp/JVN16767117/041520/index.html http://jvn.jp/en/jp/JVN16767117/index.html http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000012.html http://osvdb.org/39479 http://pro.sony.com/bbsc/ssr/cat-securitycameras/resource.downloads.bbsccms-assets-cat-camsec-downloads-AffectedNetworkCameras.shtml http://www.securityfocus.com/bid/24684 https://exchange.xforce.ibmcloud.com/vulnerabilities/35133 •

CVSS: 7.8EPSS: 1%CPEs: 2EXPL: 0

The Remote Play feature in Sony Playstation 3 (PS3) 1.60 and Playstation Portable (PSP) 3.10 OE-A allows remote attackers to cause a denial of service via a flood of UDP packets. La característica de Jugar de forma remota en in Sony Playstation 3 (PS3) 1.60 y de la Playstation Portable (PSP) 3.10 OE-A permie a atacantes remotos provocar denegación de servicio a través de la inundación de paquetes UDP. • http://osvdb.org/35184 http://securityreason.com/securityalert/2485 http://www.securityfocus.com/archive/1/463847/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/33503 •

CVSS: 3.3EPSS: 1%CPEs: 2EXPL: 0

The Sony Ericsson K700i and W810i phones allow remote attackers to cause a denial of service (continual modal dialogs and UI unavailability) by repeatedly trying to OBEX push a file over Bluetooth, as demonstrated by ussp-push. Los teléfonos Sony Ericsson K700i y W810i permite a atacantes remotos provocar una denegación de servicio (diálogos modales contínuos e indisponibilidad del interfaz de usuario) intentando repetidamente la transmisión OBEX de un archivo por Bluetooth, como ha sido demostrado por ussp-push. • http://securityreason.com/securityalert/2180 http://www.securityfocus.com/archive/1/457768/100/0/threaded http://www.securityfocus.com/archive/1/457797/100/0/threaded • CWE-20: Improper Input Validation •

CVSS: 2.9EPSS: 0%CPEs: 1EXPL: 0

The Bluetooth stack in the Sony Ericsson T60 does not properly implement "Limited discoverable" mode, which allows remote attackers to obtain unauthorized inquiry responses. La pila Bluetooth en el Sony Ericsson T60 no implementa adecuadamente el modo "visible limitadamente" (Limited discoverable mode), lo cual permite a atacantes remotos obtener respuestas no autorizadas a peticiones. • http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf http://osvdb.org/37585 http://www.securityfocus.com/archive/1/455889/100/0/threaded •

CVSS: 4.6EPSS: 0%CPEs: 9EXPL: 0

Unspecified vulnerability in the TIFF viewer (possibly libTIFF) in the Photo Viewer in the Sony PlaystationPortable (PSP) 2.00 through 2.80 allows local users to execute arbitrary code via crafted TIFF images. NOTE: due to lack of details, it is not clear whether this is related to other issues such as CVE-2006-3464 or CVE-2006-3465. Vulnerabilidad no especificada en el visor RIFF (posiblemente libTIFF) en el Visor de Fotografías en la Sony Playstation Portable (PSP) 2.00 a 2.80 permite a usuarios locales ejecutar código de su elección mediante imágenes TIFF creadas artesanalmente. NOTA: debido a la falta de detalles, no está claro si está relacionada con otras vulnerabilidades como CVE-2006-3464 o CVE-2006-3465. • http://noobz.eu/content/home.html#280806 http://secunia.com/advisories/21672 http://www.vupen.com/english/advisories/2006/3419 https://exchange.xforce.ibmcloud.com/vulnerabilities/28689 •