Page 6 of 28 results (0.004 seconds)

CVSS: 7.8EPSS: 17%CPEs: 4EXPL: 1

Buffer overflow in Sony Ericsson K600i, V600i, W800i, and T68i cell phone allows remote attackers to cause a denial of service (reboot or shutdown) through a wireless Bluetooth connection via a malformed Logical Link Control and Adaptation Protocol (L2CAP) packet whose length field is less than the actual length of the packet. Desbordamiento de búfer en teléfonos móviles Sony Ericsson K600i, V600i, W800i y T68i permite a atacantes remotos provocar una denegación de servicio (reinicio o apagado) a través de una conexión inalámbrica de Bluetooth a través de un paquete Logical Link Control and Adaptation Protocol (L2CAP) malformado cuya longitud de campo es menor que la longitud actual del paquete. • https://www.exploit-db.com/exploits/1473 http://marc.info/?l=bugtraq&m=113926179907655&w=2 http://marc.info/?l=full-disclosure&m=113924661724270&w=2 http://secunia.com/advisories/18747 http://www.secuobs.com/news/05022006-bluetooth7.shtml#english http://www.securityfocus.com/bid/16512 http://www.vupen.com/english/advisories/2006/0478 https://exchange.xforce.ibmcloud.com/vulnerabilities/24534 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

The web administration page for the Ericsson HM220dp ADSL modem does not require authentication, which could allow remote attackers to gain access from the LAN side. • https://www.exploit-db.com/exploits/22244 http://archives.neohapsis.com/archives/bugtraq/2003-02/0127.html http://marc.info/?l=bugtraq&m=104619331706574&w=2 http://www.securityfocus.com/bid/6824 https://exchange.xforce.ibmcloud.com/vulnerabilities/11290 • CWE-287: Improper Authentication •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Tigris remote access server before 11.5.4.22 does not properly record Radius accounting information when a user fails the initial login authentication but subsequently succeeds. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0104.html http://www.securityfocus.com/bid/1345 https://exchange.xforce.ibmcloud.com/vulnerabilities/4705 •