Page 2 of 9 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Enterasys Vertical Horizon VH-2402S before firmware 2.05.05.09 does not properly restrict certain debugging commands to the ADMIN account, which could allow attackers to obtain sensitive information or modify the registry. • http://secunia.com/advisories/15757 http://www.enterasys.com/support/relnotes/VH-4802-2050509-patch-rel.pdf •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 0

Enterasys XSR-1800 series Security Routers, when running firmware 7.0.0.0 and using Policy-Based Routing, allow remote attackers to cause a denial of service (crash) via a packet with the IP record route option set. • http://marc.info/?l=bugtraq&m=108886995627906&w=2 http://www.enterasys.com/support/security/incidents/2004/07/11036.html http://www.securityfocus.com/bid/10653 https://exchange.xforce.ibmcloud.com/vulnerabilities/16616 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 3

The MPS functionality in Enterasys SSR8000 (Smart Switch Router) before firmware 8.3.0.10 allows remote attackers to cause a denial of service (crash) via multiple port scans to ports 15077 and 15078. La funcionalidad MPS en Enterasys SSR8000 (Smart Switch Router) con firmware anterior a 8.3.0.10 permite a atacantes remotos causar una denegación de servicio (caída) mediante múltiples escaneos de puertos a puertos 15077 y 15078. • https://www.exploit-db.com/exploits/21791 http://archives.neohapsis.com/archives/bugtraq/2002-09/0141.html http://www.enterasys.com/support/techtips/tk0659-9.html http://www.iss.net/security_center/static/10096.php http://www.securityfocus.com/bid/5703 •

CVSS: 7.5EPSS: 7%CPEs: 8EXPL: 1

Various Intrusion Detection Systems (IDS) including (1) Cisco Secure Intrusion Detection System, (2) Cisco Catalyst 6000 Intrusion Detection System Module, (3) Dragon Sensor 4.x, (4) Snort before 1.8.1, (5) ISS RealSecure Network Sensor 5.x and 6.x before XPU 3.2, and (6) ISS RealSecure Server Sensor 5.5 and 6.0 for Windows, allow remote attackers to evade detection of HTTP attacks via non-standard "%u" Unicode encoding of ASCII characters in the requested URL. • https://www.exploit-db.com/exploits/21100 http://marc.info/?l=bugtraq&m=99972950200602&w=2 http://www.cisco.com/warp/public/707/cisco-intrusion-detection-obfuscation-vuln-pub.shtml http://www.kb.cert.org/vuls/id/548515 http://www.securityfocus.com/bid/3292 http://xforce.iss.net/alerts/advise95.php •