Page 31 of 157 results (0.014 seconds)

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 2

GlobalSunTech Wireless Access Points (1) WISECOM GL2422AP-0T, and possibly OEM products such as (2) D-Link DWL-900AP+ B1 2.1 and 2.2, (3) ALLOY GL-2422AP-S, (4) EUSSO GL2422-AP, and (5) LINKSYS WAP11-V2.2, allow remote attackers to obtain sensitive information like WEP keys, the administrator password, and the MAC filter via a "getsearch" request to UDP port 27155. • http://online.securityfocus.com/archive/1/298432 http://www.iss.net/security_center/static/10536.php http://www.securityfocus.com/bid/6100 •

CVSS: 5.0EPSS: 3%CPEs: 11EXPL: 3

Buffer overflow in the Embedded HTTP server, as used in (1) D-Link DI-804 4.68, Dl-704 V2.56b6, and Dl-704 V2.56b5 and (2) Linksys Etherfast BEFW11S4 Wireless AP + Cable/DSL Router 1.37.2 through 1.42.7 and Linksys WAP11 1.3 and 1.4, allows remote attackers to cause a denial of service (crash) via a long header, as demonstrated using the Host header. • https://www.exploit-db.com/exploits/21978 http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0052.html http://www.iss.net/security_center/static/10537.php http://www.securityfocus.com/bid/6090 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

The web server for D-Link DP-300 print server allows remote attackers to cause a denial of service (hang) via a large HTTP POST request. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0341.html http://marc.info/?l=vuln-dev&m=102779425117680&w=2 http://www.iss.net/security_center/static/9703.php http://www.securityfocus.com/bid/5330 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The remote administration capability for the D-Link DI-804 router 4.68 allows remote attackers to bypass authentication and release DHCP addresses or obtain sensitive information via a direct web request to the pages (1) release.htm, (2) Device Status, or (3) Device Information. • http://marc.info/?l=bugtraq&m=103004834131542&w=2 http://online.securityfocus.com/archive/1/288584 http://www.iss.net/security_center/static/9967.php http://www.iss.net/security_center/static/9969.php http://www.securityfocus.com/bid/5544 http://www.securityfocus.com/bid/5553 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

D-Link DWL-1000AP Firmware 3.2.28 #483 Wireless LAN Access Point uses a default SNMP community string of 'public' which allows remote attackers to gain sensitive information. El punto de acceso a redes LAN sin cables D-Link DWL-1000AP Firmware 3.2.28 #483 usa por defecto la cadena "public" como comunidad SNMP, lo que permite a atacantes remotos obtener acceso a información sensible. • http://www.securityfocus.com/archive/1/246849 http://www.securityfocus.com/bid/3736 •