Page 3 of 41 results (0.006 seconds)

CVSS: 10.0EPSS: 80%CPEs: 1EXPL: 8

Multiple stack-based buffer overflows in 3Com 3CTftpSvc 2.0.1, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long mode field (aka transporting mode) in a (1) GET or (2) PUT command. Vulnerabilidades múltiples de desbordamiento de búfer basado en pila en 3Com 3CTftpSvc 2.0.1, y posiblemente versiones anteriores, permite a atacantes remotos provocar una denegación de servicio (caída) o ejecutar código de su elección mediante un campo mode largo (también conocido como transporting mode) en un comando (1) GET ó (2) PUT. • https://www.exploit-db.com/exploits/2855 https://www.exploit-db.com/exploits/2865 https://www.exploit-db.com/exploits/3388 https://www.exploit-db.com/exploits/3170 https://www.exploit-db.com/exploits/16347 http://secunia.com/advisories/23113 http://securityreason.com/securityalert/1930 http://www.securityfocus.com/archive/1/452754/100/0/threaded http://www.securityfocus.com/bid/21301 http://www.securityfocus.com/bid/21322 http://www.vupen.com/english/advisories/2006& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

3Com Switch SS3 4400 switches, firmware 5.11, 6.00 and 6.10 and earlier, allow remote attackers to read the SNMP Read-Write Community string and conduct unauthorized actions via unspecified "normally restricted management packets on the device" that cause the community string to be returned. El firmware de los conmutadores de 3Com Switch SS3 4400, versiones 5.11, 6.00, 6.10 y anteriores, permite a atacantes remotos la lectura de la cadena SNMP Read-Write Community y realizar acciones no autorizadas mediante paquetes de gestión normalmente restringidos en el dispositivo, que provocan que la cadena community sea devuelta. • http://secunia.com/advisories/22818 http://securitytracker.com/id?1017128 http://www.3com.com/securityalert/alerts/3COM-06-004.html http://www.securityfocus.com/bid/20736 http://www.vupen.com/english/advisories/2006/4184 https://exchange.xforce.ibmcloud.com/vulnerabilities/29779 •

CVSS: 5.0EPSS: 7%CPEs: 1EXPL: 0

TippingPoint IPS running the TippingPoint Operating System (TOS) before 2.2.4.6519 allows remote attackers to "force the device into layer 2 fallback (L2FB)", causing a denial of service (page fault), via a malformed packet. TippingPoint IPS bajo TippingPoint Operating System (TOS) anterior a 2.2.4.6519 permite a atacantes remotos "forzar al dispositivo dentro de (L2FB) " (layer 2 fallback), provocando una denegación de servicio (fallo de pagina), a través de paquetes malformados. • http://secunia.com/advisories/21154 http://securityreason.com/securityalert/1286 http://securitytracker.com/id?1016562 http://www.3com.com/securityalert/alerts/3COM-06-003.html http://www.securityfocus.com/archive/1/440944/100/0/threaded http://www.securityfocus.com/bid/19125 http://www.vupen.com/english/advisories/2006/2956 https://exchange.xforce.ibmcloud.com/vulnerabilities/27934 • CWE-254: 7PK - Security Features •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

The web management interface in 3Com TippingPoint SMS Server before 2.2.1.4478 does not restrict access to certain directories, which might allow remote attackers to obtain potentially sensitive information such as configuration settings. This vulnerability may allow attackers to access sensitive information from vulnerable TippingPoint SMS servers. The specific flaw exists within the web management interface. Due to insufficient protections on specific directories, an attacker with access to the web interface may be able to view benign data such as the user manual. In the event that the device was being used for backup purposes, it may be possible for an attacker to identify additional information such as configuration settings. • http://secunia.com/advisories/20058 http://securityreason.com/securityalert/870 http://securitytracker.com/id?1016051 http://www.3com.com/securityalert/alerts/3COM-06-002.html http://www.osvdb.org/25360 http://www.securityfocus.com/archive/1/433432/100/0/threaded http://www.securityfocus.com/bid/17935 http://www.vupen.com/english/advisories/2006/1752 http://www.zerodayinitiative.com/advisories/ZDI-06-013.html https://exchange.xforce.ibmcloud.com/vulnerabilities/26338 •

CVSS: 5.0EPSS: 4%CPEs: 1EXPL: 0

3Com Baseline Switch 2848-SFP Plus Model #3C16486 with firmware before 1.0.2.0 allows remote attackers to cause a denial of service (unstable operation) via long DHCP packets. • http://secunia.com/advisories/19756 http://securitytracker.com/id?1015997 http://support.3com.com/infodeli/tools/switches/baseline/3C16486_V1_0_2_0_readme.pdf http://www.osvdb.org/24942 http://www.securityfocus.com/bid/17686 http://www.vupen.com/english/advisories/2006/1510 https://exchange.xforce.ibmcloud.com/vulnerabilities/26076 •