Page 4 of 18 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Linksys WRT54G router uses the same private key and certificate for every router, which allows remote attackers to sniff the SSL connection and obtain sensitive information. El rúter de Linksys WRT54G usa la misma clave privada en todos los rúter, lo que permite que atacantes remotos puedan escuchar conexiones SSL y obtener así información confidencial. • http://marc.info/?l=bugtraq&m=112258422806340&w=2 http://secunia.com/advisories/16271 http://securitytracker.com/id?1014596 http://www.securityfocus.com/bid/14407 https://exchange.xforce.ibmcloud.com/vulnerabilities/21635 •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 0

The Web interface in Linksys WRT54G 2.02.7 and BEFSR41 version 3, with the firewall disabled, allows remote attackers to attempt to login to an administration web page, even when the configuration specifies that remote administration is disabled. • ftp://ftp.linksys.com/pub/network/wrt54g_2.02.8_US_code_beta.zip http://archives.neohapsis.com/archives/bugtraq/2004-05/0316.html http://archives.neohapsis.com/archives/bugtraq/2004-06/0002.html http://archives.neohapsis.com/archives/bugtraq/2004-06/0020.html http://archives.neohapsis.com/archives/bugtraq/2004-06/0190.html http://secunia.com/advisories/11754 http://web.archive.org/web/20040823075750/http://www.linksys.com/download/firmware.asp?fwid=201 http://www.nwfusion. •

CVSS: 5.0EPSS: 2%CPEs: 50EXPL: 2

DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information. DHCP en los encaminadores de cable y ADSL Linksys BEFSR11, BEFSR41, BEFSR81 y BEFSRU31, con versión de firmware 1.45.7, no limpia adecuadamente búferes usados anteriormente en un paquete de respueta BOOTP, lo que permite a atacantes remotos obtener información sensible. • https://www.exploit-db.com/exploits/24115 http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832&p_%20%5Ccreated=1086294093&p_sid=pU1X1idh&p_lva=&p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20%5CJnBfcm93X2NudD02NTQmcF9wYWdlPTE%2A&p_li= http://marc.info/?l=bugtraq&m=108662876129301&w=2 http://secunia.com/advisories/11606 http://securitytracker.com/alerts/2004/May/1010288.html http://www.osvdb.org/6325 http://www.securityfocus.com/bid/10329 https://exchange& •