5 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Unknown vulnerability in 3Com OfficeConnect Remote 812 ADSL Router allows remote attackers to bypass authentication via repeated attempts using any username and password. NOTE: this identifier was inadvertently re-used for another issue due to a typo; that issue was assigned CVE-2004-0447. This candidate is ONLY for the ADSL router bypass. Vulnerabilidad desconocida en 3Com OfficeConncet Remote 812 ADSL Router permite a atacantes remotos saltarse la autenticación mediante repetidos intentos usando cualquier nombre de usuario y contraseña. • http://secunia.com/advisories/11716 http://www.idefense.com/application/poi/display?id=106&type=vulnerabilities&flashstatus=false http://www.securityfocus.com/bid/10426 https://exchange.xforce.ibmcloud.com/vulnerabilities/16267 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

Buffer overflow in 3Com OfficeConnect Remote 812 ADSL Router 1.1.9.4 allows remote attackers to cause a denial of service (reboot or packet loss) via a long string containing Telnet escape characters to the Telnet port. Desbordamiento de búfer en el encaminador ADSL 3Com OfficeConnect Remote 812 1.1.9.4 permite a atacantes remotos causar una denegación de servicio (reinicio o pérdida de paquetes) mediante una cadena larga conteniendo caractéres de escape de Telnet en el puerto Telnet. • http://secunia.com/advisories/11716 http://www.idefense.com/application/poi/display?id=105&type=vulnerabilities http://www.securityfocus.com/bid/10419 https://exchange.xforce.ibmcloud.com/vulnerabilities/16257 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

3com OfficeConnect Remote 812 ADSL Router 1.1.7 does not properly clear memory from DHCP responses, which allows remote attackers to identify the contents of previous HTTP requests by sniffing DHCP packets. 3com OfficeConnect Remote 812 ADSL Router 1.1.7 no limpia la memoria de peticiones DHCP, lo que permite que atacantes remotos identifiquen los contenidos de peticiones HTTP previas husmeando paquetes DHCP. • http://marc.info/?l=bugtraq&m=105292451702516&w=2 http://marc.info/?l=bugtraq&m=105301488426951&w=2 http://nautopia.coolfreepages.com/vulnerabilidades/3com812_dhcp_leak.htm http://www.securityfocus.com/bid/7592 https://exchange.xforce.ibmcloud.com/vulnerabilities/11999 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

3Com OfficeConnect Remote 812 ADSL Router, firmware 1.1.9 and 1.1.7, allows remote attackers to bypass port access restrictions by connecting to an approved port and quickly connecting to the desired port, which is allowed by the router. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0230.html http://archives.neohapsis.com/archives/bugtraq/2002-06/0102.html http://www.iss.net/security_center/static/9185.php http://www.securityfocus.com/bid/4841 •

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 3

3COM OfficeConnect 812 and 840 ADSL Router 4.2, running OCR812 router software 1.1.9 and earlier, allows remote attackers to cause a denial of service via a long string containing a large number of "%s" strings, possibly triggering a format string vulnerability. • https://www.exploit-db.com/exploits/20847 http://archives.neohapsis.com/archives/bugtraq/2001-05/0115.html http://marc.info/?l=bugtraq&m=100119572524232&w=2 http://marc.info/?l=bugtraq&m=100137290421828&w=2 http://www.securityfocus.com/bid/2721 https://exchange.xforce.ibmcloud.com/vulnerabilities/6573 •