Page 5 of 25 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Integer overflow in AnywhereUSB/5 1.80.00 allows local users to cause a denial of service (crash) via a 1 byte header size specified in the USB string descriptor. Desbordamiento de enteros en AnywhereUSB/5 1.80.00 permite a un usuario local provocar denegación de servicio (caida) a través de una cabecera de tamaño de 1 byte especificada en el descriptor de cadena de USB. • http://secunia.com/advisories/21739 http://securityreason.com/securityalert/1500 http://www.safend.com/advisories/digi_anywhereusb5_intoverflow.txt http://www.securityfocus.com/archive/1/445088/100/0/threaded http://www.securityfocus.com/bid/19833 •

CVSS: 5.0EPSS: 4%CPEs: 3EXPL: 3

DiGi Web Server allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request that contains a large number of / (slash) characters, which consumes resources when DiGi converts the slashes to \ (backslash) characters. • https://www.exploit-db.com/exploits/24066 http://marc.info/?l=bugtraq&m=108311170018203&w=2 http://secunia.com/advisories/11490 http://securitytracker.com/alerts/2004/Apr/1009957.html http://sourceforge.net/project/shownotes.php?release_id=234261 http://www.autistici.org/fdonato/advisory/DiGiWwwServerC1-adv.txt http://www.osvdb.org/5702 http://www.securityfocus.com/bid/10228 https://exchange.xforce.ibmcloud.com/vulnerabilities/15987 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

admin.php in Digi-ads 1.1 allows remote attackers to bypass authentication via a cookie with the username set to the name of the administrator, which satisfies an improper condition in admin.php that does not require a correct password. admin.php en Digi-ads 1.1 permite a atacantes remotos saltarse la autenticación mediante una galletita (cookie) con el nombre de usuario establecido al nombre del administrador, lo que satisface una condición inapropiada en admin.php de no requerir una contraseña correcta. • http://marc.info/?l=bugtraq&m=105839007002993&w=2 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

admin.php in Digi-news 1.1 allows remote attackers to bypass authentication via a cookie with the username set to the name of the administrator, which satisfies an improper condition in admin.php that does not require a correct password. admin.php en Digi-news 1.1 permite a atacantes remotos saltarse la autenticación mediante una galletita (cookie) con el nombre de usuario establecido al nombre del administrador, lo que satisface una condición inapropiada en admin.php de no requerir una contraseña correcta. • http://marc.info/?l=bugtraq&m=105839007002993&w=2 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Digi-Net Technologies DigiChat 3.5 allows chat users to obtain the IP addresses of other chat users via a "Showip" parameter in the chat applet. • http://www.securityfocus.com/bid/5019 •