Page 20 of 120 results (0.011 seconds)

CVSS: 6.8EPSS: 0%CPEs: 6EXPL: 0

Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device. Múltiples vulnerabilidades CSRF en la utilidad de gestión web de los enrutadores NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, y AtermWM3450RN, permite a los atacantes remotos secuestrar la autenticación de los administradores para peticiones que (1)inicializan opciones o (2) reinician el dispositivo. • http://jpn.nec.com/security-info/secinfo/nv13-005.html http://jvn.jp/en/jp/JVN59503133/6443/index.html http://jvn.jp/en/jp/JVN59503133/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.0EPSS: 0%CPEs: 6EXPL: 0

NEC Universal RAID Utility 1.40 Rev 680 and earlier, 2.31 Rev 1492 and earlier, and 2.5 Rev 2244 and earlier does not provide access control, which allows remote attackers to perform arbitrary RAID disk operations via unspecified vectors. NEC Universal RAID Utility v1.40 Rev 680 y anteriores, v2.31 Rev 1492 y anteriores, y v2.5 Rev 2244 y anteriores no proporciona control de acceso, lo que permite que atacantes remotos lleven a cabo operaciones arbitrarias de disco RAID mediante vectores desconocidos • http://jpn.nec.com/security-info/secinfo/nv13-004.html http://jvn.jp/en/jp/JVN75585394/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2013-000012 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 594EXPL: 0

Yamaha RTX, RT, SRT, RTV, RTW, and RTA series routers with firmware 6.x through 10.x, and NEC IP38X series routers with firmware 6.x through 10.x, do not properly handle IP header options, which allows remote attackers to cause a denial of service (device reboot) via a crafted option that triggers access to an invalid memory location. Routers de serie Yamaha RTX, RT, SRT, RTV, RTW, y RTA con firmware v6.x hasta 10.x, y routers de serie NEC IP38X con firmware v6.x hasta v10.x, no maneja adecuadamente las opciones de la cabecera IP, lo que permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) a través de una peticion manipulada que provoca el acceso a un lugar de memoria no válida. • http://jvn.jp/en/jp/JVN55714408/index.html http://www.nec.co.jp/security-info/secinfo/nv11-004.html http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN55714408.html • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

Unspecified vulnerability in NEC CapsSuite Small Edition PatchMeister 2.0 Update2 and earlier allows remote attackers to cause a denial of service (OS shutdown or restart) via vectors related to Client Service for PTM and crafted packets to port 56015. Vulnerabilidad sin especificar en NEC CapsSuite Small Edition PatchMeister v2.0 Update2 y anteriores permite a atacantes remotos provocar una denegación de servicio (apagado o reinicio del sistema operativo) a través de vectores relacionados con Client Service para PTM y paquetes manipulados al puerto 56015. • http://jvn.jp/en/jp/JVN82749282/index.html http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000020.html http://osvdb.org/64701 http://secunia.com/advisories/39800 http://www.ipa.go.jp/about/press/20100517_2.html http://www.nec.co.jp/security-info/secinfo/nv10-005.html http://www.securityfocus.com/bid/40190 http://www.vupen.com/english/advisories/2010/1166 •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

Unspecified vulnerability in NEC WebSAM DeploymentManager 5.13 and earlier, as used in SigmaSystemCenter 2.1 Update2 and earlier, BladeSystemCenter, ExpressSystemCenter, and VirtualPCCenter 2.2 and earlier, allows remote attackers to cause a denial of service (OS shutdown or restart) via unknown vectors related to Client Service for DPM and crafted packets to port 56010. Vulnerabilidad sin especificar en NEC WebSAM DeploymentManager 5.13 y anteriores, como la utilizada en SigmaSystemCenter v2.1 Update2 y anteriores, BladeSystemCenter, ExpressSystemCenter, y VirtualPCCenter v2.2 y anteriores, permite a atacantes remotos causar una denegación de servicio (apagado o reinicio del sistema operativo) a través de vectores desconocidos relacionados con Client Service para DPM y paquetes manipulados al puerto 65010. • http://jvn.jp/en/jp/JVN90872372/index.html http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000019.html http://osvdb.org/64700 http://secunia.com/advisories/39802 http://www.nec.co.jp/security-info/secinfo/nv10-004.html http://www.securityfocus.com/bid/40196 •