Page 17 of 98 results (0.008 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 1

Linksys PSUS4 running firmware 6032 allows remote attackers to cause a denial of service (device crash) via an HTTP POST request containing an unknown parameter without a value. • http://marc.info/?l=bugtraq&m=110747234701646&w=2 http://secunia.com/advisories/14136 http://www.securityfocus.com/bid/12443 https://exchange.xforce.ibmcloud.com/vulnerabilities/19222 •

CVSS: 5.0EPSS: 5%CPEs: 1EXPL: 2

Absolute path traversal vulnerability in main.cgi in Linksys WVC11B Wireless-B Internet Video Camera allows remote attackers to read arbitrary files via an absolute pathname in the next_file parameter. • https://www.exploit-db.com/exploits/24175 http://archives.neohapsis.com/archives/bugtraq/2004-06/0103.html http://secunia.com/advisories/11811 http://securitytracker.com/id?1010489 http://www.osvdb.org/7112 http://www.securityfocus.com/bid/10476 https://exchange.xforce.ibmcloud.com/vulnerabilities/16339 •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 0

The Web interface in Linksys WRT54G 2.02.7 and BEFSR41 version 3, with the firewall disabled, allows remote attackers to attempt to login to an administration web page, even when the configuration specifies that remote administration is disabled. • ftp://ftp.linksys.com/pub/network/wrt54g_2.02.8_US_code_beta.zip http://archives.neohapsis.com/archives/bugtraq/2004-05/0316.html http://archives.neohapsis.com/archives/bugtraq/2004-06/0002.html http://archives.neohapsis.com/archives/bugtraq/2004-06/0020.html http://archives.neohapsis.com/archives/bugtraq/2004-06/0190.html http://secunia.com/advisories/11754 http://web.archive.org/web/20040823075750/http://www.linksys.com/download/firmware.asp?fwid=201 http://www.nwfusion. •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 4

Cross-site scripting (XSS) vulnerability in main.cgi in Linksys WVC11B Wireless-B Internet Video Camera allows remote attackers to inject arbitrary web script or HTML via the next_file parameter. • https://www.exploit-db.com/exploits/24197 http://archives.neohapsis.com/archives/bugtraq/2004-06/0215.html http://secunia.com/advisories/11881 http://securitytracker.com/id?1010424 http://www.securityfocus.com/bid/10533 https://exchange.xforce.ibmcloud.com/vulnerabilities/16415 •

CVSS: 5.0EPSS: 2%CPEs: 50EXPL: 2

DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information. DHCP en los encaminadores de cable y ADSL Linksys BEFSR11, BEFSR41, BEFSR81 y BEFSRU31, con versión de firmware 1.45.7, no limpia adecuadamente búferes usados anteriormente en un paquete de respueta BOOTP, lo que permite a atacantes remotos obtener información sensible. • https://www.exploit-db.com/exploits/24115 http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832&p_%20%5Ccreated=1086294093&p_sid=pU1X1idh&p_lva=&p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20%5CJnBfcm93X2NudD02NTQmcF9wYWdlPTE%2A&p_li= http://marc.info/?l=bugtraq&m=108662876129301&w=2 http://secunia.com/advisories/11606 http://securitytracker.com/alerts/2004/May/1010288.html http://www.osvdb.org/6325 http://www.securityfocus.com/bid/10329 https://exchange& •