Page 4 of 41 results (0.009 seconds)

CVSS: 5.0EPSS: 3%CPEs: 2EXPL: 0

TippingPoint Intrusion Prevention System (IPS) TOS before 2.1.4.6324, and TOS 2.2.x before 2.2.1.6506, allow remote attackers to cause a denial of service (CPU consumption) via an unknown vector, probably involving an HTTP request with a negative number in the Content-Length header. TippingPoint Intrusion Prevention System (IPS) TOS en versiones anteriores a 2.1.4.6324 y TOS 2.2.x en versiones anteriores a 2.2.1.6506, permiten a atacantes remotos provocar una denegación de servicio (consumo de CPU) a través de un vector desconocido, probablemente involucrando una petición HTTP con un número negativo en la cabezera Content-Length. • http://isc.sans.org/diary.php?storyid=1042 http://secunia.com/advisories/18515 http://securitytracker.com/id?1015511 http://www.eweek.com/article2/0%2C1759%2C1912048%2C00.asp http://www.osvdb.org/22504 http://www.securityfocus.com/bid/16299 https://exchange.xforce.ibmcloud.com/vulnerabilities/24200 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in the web server for 3Com Network Supervisor 5.0.2 allows remote attackers to read arbitrary files via ".." sequences in the URL to TCP port 21700. • http://secunia.com/advisories/16639 http://securitytracker.com/id?1014836 http://www.idefense.com/application/poi/display?id=300&type=vulnerabilities&flashstatus=true http://www.vupen.com/english/advisories/2005/1611 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

Unknown vulnerability in 3Com OfficeConnect Wireless 11g Access Point before 1.03.12 allows remote attackers to obtain sensitive information via the web interface. Vulnerabilidad desconocida en Com OfficeConnect Wireless 11g Access Point anterior a la 1.03.12 permite que atacantes remotos obtengan información confidencial mediante la interfaz web. • http://secunia.com/advisories/16207 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 1

Multiple heap-based buffer overflows in 3Com 3CServer allow remote authenticated users to execute arbitrary code via long FTP commands, as demonstrated using the STAT command. Múltiples desbordamientos de búfer basados en 3Com 3CServer permite a usuarios remotos autenticados ejecutar código de su elección mediante comandos FTP largos, como se ha demostrado usando el comando STAT. • https://www.exploit-db.com/exploits/794 http://marc.info/?l=bugtraq&m=110780306326130&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/19250 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

TFTP in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to cause a denial of service (application crash) via a GET request containing an MS-DOS device name. • http://marc.info/?l=bugtraq&m=110485674622696&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/18750 •