Page 2 of 8 results (0.001 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

PWR-Q200 does not use random values for source ports of DNS query packets, which allows remote attackers to conduct DNS cache poisoning attacks. PWR-Q200 no utiliza valores aleatorios para los puertos de origen de los paquetes de consultas DNS, lo que permite que los atacantes remotos realicen ataques de envenenamiento de la memoria caché DNS. • http://web116.jp/shop/hikari_p/q200/q200_00.html https://jvn.jp/en/jp/JVN73141967/index.html • CWE-330: Use of Insufficiently Random Values •

CVSS: 8.8EPSS: 0%CPEs: 12EXPL: 0

Cross-site request forgery (CSRF) vulnerability on NTT EAST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1006 and earlier and NTT WEST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1005 and earlier allows remote attackers to hijack the authentication of arbitrary users. Vulnerabilidad CSRF en routers NTT EAST Hikari Denwa con firmware PR-400MI, RT-400MI y RV-440MI 07.00.1006 y versiones anteriores y routers NTT WEST Hikari Denwa con firmware PR-400MI, RT-400MI y RV-440MI 07.00.1005 y versiones anteriores permite a atacantes remotos secuestrar la autenticación de usuarios arbitrarios. • http://jvn.jp/en/jp/JVN45034304/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2016-000106 http://web116.jp/ced/support/news/contents/2016/20160627.html http://www.ntt-west.co.jp/kiki/support/flets/hgw4_mi/160627.html • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

NTT EAST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1006 and earlier and NTT WEST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1005 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors. Routers NTT EAST Hikari Denwa con firmware PR-400MI, RT-400MI y RV-440MI 07.00.1006 y versiones anteriores y routers NTT WEST Hikari Denwa con firmware PR-400MI, RT-400MI y RV-440MI 07.00.1005 y versiones anteriores, permiten a usuarios remotos autenticados ejecutar comandos SO arbitrarios a través de vectores no especificados. • http://jvn.jp/en/jp/JVN77403442/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2016-000105 http://web116.jp/ced/support/news/contents/2016/20160627.html http://www.ntt-west.co.jp/kiki/support/flets/hgw4_mi/160627.html •