6 results (0.003 seconds)

CVSS: 7.5EPSS: 86%CPEs: 296EXPL: 2

31 May 2005 — Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 0

09 Jan 2002 — Cisco SN 5420 Storage Router 1.1(5) and earlier allows remote attackers to cause a denial of service (halt) via a fragmented packet to the Gigabit interface. • http://www.cisco.com/warp/public/707/SN-multiple-pub.shtml •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

09 Jan 2002 — Cisco SN 5420 Storage Router 1.1(5) and earlier allows attackers to read configuration files without authorization. • http://www.cisco.com/warp/public/707/SN-multiple-pub.shtml •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

09 Jan 2002 — Cisco SN 5420 Storage Router 1.1(5) and earlier allows remote attackers to cause a denial of service (router crash) via an HTTP request with large headers. • http://www.cisco.com/warp/public/707/SN-multiple-pub.shtml •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

11 Jul 2001 — Cisco SN 5420 Storage Router 1.1(3) and earlier allows remote attackers to cause a denial of service (reboot) via a series of connections to TCP port 8023. • http://www.ciac.org/ciac/bulletins/l-112.shtml •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

08 Jan 2001 — Cisco SN 5420 Storage Router 1.1(3) and earlier allows local users to access a developer's shell without a password and execute certain restricted commands without being logged. • http://www.cisco.com/warp/public/707/SN-kernel-pub.html •