Page 9 of 117 results (0.008 seconds)

CVSS: 7.8EPSS: 40%CPEs: 1EXPL: 3

25 Apr 2007 — The Linksys SPA941 VoIP Phone allows remote attackers to cause a denial of service (device reboot) via a 0377 (0xff) character in the From header, and possibly certain other locations, in a SIP INVITE request. Linksys SPA941 VoIP Phone permite a atacantes remotos provocar denegación de servicio (reinicio de dispositivo) a través del caracter 0377 (0ff) en la cabecera From, y posiblemente otras ciertas localizaciones en una respuesta SIP INVITE. • https://www.exploit-db.com/exploits/3791 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

21 Mar 2007 — The Linksys WAG200G with firmware 1.01.01, WRT54GC 2 with firmware 1.00.7, and WRT54GC 1 with firmware 1.03.0 and earlier allow remote attackers to obtain sensitive information (passwords and configuration data) via a packet to UDP port 916. NOTE: some of these details are obtained from third party information. El Linksys WAG200G con componente firmware versión 1.01.01, WRT54GC 2 con componente firmware versión 1.00.7 y WRT54GC 1 con componente firmware versión 1.03.0 y versiones anteriores permiten a los a... • http://marc.info/?l=bugtraq&m=117492736903388&w=2 •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

06 Mar 2007 — The HTTP server in Linksys SPA-921 VoIP Desktop Phone allows remote attackers to cause a denial of service (reboot) via (1) a long URL, or a long (2) username or (3) password during Basic Authentication. El servidor HTTP en Linksys SPA-921 VoIP Desktop Phone permite a atacantes remotos provocar una denegación de servicio (reinicio) mediante (1) un URL largo, o (2) el nombre de usuario o (3) la contraseña largos durante la Autenticación Básica. • http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0089.html •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

10 Dec 2006 — PhoneCtrl.exe in Linksys WIP 330 Wireless-G IP Phone 1.00.06A allows remote attackers to cause a denial of service (crash) via a TCP SYN scan, as demonstrated using TCP ports 1-65535 with nmap. PhoneCtrl.exe en Linksys WIP 330 Wireless-G IP Phone 1.00.06A permite a atacantes remotos provocar una denegación de servicio (caída) mediante un escaneo TCP SYN, como se demuestra usando puertos TCP 1-65535 con nmap. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051140.html •

CVSS: 9.8EPSS: 21%CPEs: 2EXPL: 1

14 Nov 2006 — Stack-based buffer overflow in the Broadcom BCMWL5.SYS wireless device driver 3.50.21.10, as used in Cisco Linksys WPC300N Wireless-N Notebook Adapter before 4.100.15.5 and other products, allows remote attackers to execute arbitrary code via an 802.11 response frame containing a long SSID field. Desbordamiento de búfer basado en la pila en el controlador de dispositivo wireless Broadcom BCMWL5.SYS 3.50.21.10, como ha sido usado en Cisco Linksys WPC300N Wireless-N Notebook Adapter anterior a 4.100.15.5 y ot... • https://www.exploit-db.com/exploits/2770 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 18%CPEs: 1EXPL: 4

09 Oct 2006 — Linksys WRT54g firmware 1.00.9 does not require credentials when making configuration changes, which allows remote attackers to modify arbitrary configurations via a direct request to Security.tri, as demonstrated using the SecurityMode and layout parameters, a different issue than CVE-2006-2559. El firmware 1.00.9 del Linksys WRT54g no necesita credenciales para hacer cambios de configuración, lo que permite a atacantes remotos modificar configuraciones de su elección mediante una petición directa a Securi... • https://www.exploit-db.com/exploits/5926 •

CVSS: 9.1EPSS: 0%CPEs: 9EXPL: 0

24 May 2006 — Linksys WRT54G Wireless-G Broadband Router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic. • http://secunia.com/advisories/20161 •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 0

21 Apr 2006 — Multiple unspecified vulnerabilities in Linksys RT31P2 VoIP router allow remote attackers to cause a denial of service via malformed Session Initiation Protocol (SIP) messages. • http://secunia.com/advisories/19722 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

07 Mar 2006 — Linksys WRT54G routers version 5 (running VXWorks) allow remote attackers to cause a denial of service by sending a malformed DCC SEND string to an IRC channel, which causes an IRC connection reset, possibly related to the masquerading code for NAT environments, and as demonstrated via (1) a DCC SEND with a single long argument, or (2) a DCC SEND with IP, port, and filesize arguments with a 0 value. • http://www.hm2k.org/news/1141413208.html •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

19 Jan 2006 — Linksys BEFVP41 VPN Router 2.0 with firmware 1.01.04 allows remote attackers on the local network, to cause a denial of service via IP packets with a null IP option length. • http://secunia.com/advisories/18461 •