Page 14 of 98 results (0.007 seconds)

CVSS: 8.3EPSS: 5%CPEs: 2EXPL: 1

Stack-based buffer overflow in the Broadcom BCMWL5.SYS wireless device driver 3.50.21.10, as used in Cisco Linksys WPC300N Wireless-N Notebook Adapter before 4.100.15.5 and other products, allows remote attackers to execute arbitrary code via an 802.11 response frame containing a long SSID field. Desbordamiento de búfer basado en la pila en el controlador de dispositivo wireless Broadcom BCMWL5.SYS 3.50.21.10, como ha sido usado en Cisco Linksys WPC300N Wireless-N Notebook Adapter anterior a 4.100.15.5 y otros productos, permite a atacantes remotos ejecutar código de su elección mediante una trama de respuesta 802.11 que contiene un campo SSID largo. • https://www.exploit-db.com/exploits/2770 http://projects.info-pull.com/mokb/MOKB-11-11-2006.html http://secunia.com/advisories/22831 http://securitytracker.com/id?1017212 http://www.kb.cert.org/vuls/id/209376 http://www.kb.cert.org/vuls/id/MAPG-6VGNHW http://www.linksys.com/servlet/Satellite?c=L_Download_C2&childpagename=US%2FLayout&cid=1115417109934&packedargs=sku%3D1144763513196&pagename=Linksys%2FCommon%2FVisitorWrapper http://www.vupen.com/english/advisories/2006/4459 http://www • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 4

Linksys WRT54g firmware 1.00.9 does not require credentials when making configuration changes, which allows remote attackers to modify arbitrary configurations via a direct request to Security.tri, as demonstrated using the SecurityMode and layout parameters, a different issue than CVE-2006-2559. El firmware 1.00.9 del Linksys WRT54g no necesita credenciales para hacer cambios de configuración, lo que permite a atacantes remotos modificar configuraciones de su elección mediante una petición directa a Security.tri, como ha sido demostrado usando los parámetros SecurityMode y layout, un problema diferente de CVE-2006-2559. • https://www.exploit-db.com/exploits/5926 http://lists.grok.org.uk/pipermail/full-disclosure/2006-August/048495.html http://secunia.com/advisories/21372 http://securitytracker.com/id?1016638 http://www.kb.cert.org/vuls/id/930364 http://www.securityfocus.com/bid/19347 https://kinqpinz.info/lib/wrt54g https://kinqpinz.info/lib/wrt54g/own2.txt •

CVSS: 7.5EPSS: 1%CPEs: 9EXPL: 0

Linksys WRT54G Wireless-G Broadband Router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic. • http://secunia.com/advisories/20161 http://securitytracker.com/id?1016134 http://www.securityview.org/dutch-student-finds-a-bug-in-upnp.html http://www.securityview.org/how-does-the-upnp-flaw-works.html http://www.vupen.com/english/advisories/2006/1909 https://exchange.xforce.ibmcloud.com/vulnerabilities/26707 •

CVSS: 5.0EPSS: 6%CPEs: 1EXPL: 0

Multiple unspecified vulnerabilities in Linksys RT31P2 VoIP router allow remote attackers to cause a denial of service via malformed Session Initiation Protocol (SIP) messages. • http://secunia.com/advisories/19722 http://www.kb.cert.org/vuls/id/621566 http://www.kb.cert.org/vuls/id/MIMG-6GMMW4 http://www.osvdb.org/24810 http://www.securityfocus.com/bid/17631 http://www.vupen.com/english/advisories/2006/1443 https://exchange.xforce.ibmcloud.com/vulnerabilities/25915 •

CVSS: 5.0EPSS: 4%CPEs: 1EXPL: 0

Linksys WRT54G routers version 5 (running VXWorks) allow remote attackers to cause a denial of service by sending a malformed DCC SEND string to an IRC channel, which causes an IRC connection reset, possibly related to the masquerading code for NAT environments, and as demonstrated via (1) a DCC SEND with a single long argument, or (2) a DCC SEND with IP, port, and filesize arguments with a 0 value. • http://www.hm2k.org/news/1141413208.html http://www.securityfocus.com/archive/1/426756/100/0/threaded http://www.securityfocus.com/archive/1/426761/100/0/threaded http://www.securityfocus.com/archive/1/426863/100/0/threaded http://www.securityfocus.com/archive/1/426934/100/0/threaded http://www.securityfocus.com/bid/16954 https://exchange.xforce.ibmcloud.com/vulnerabilities/25230 •