9 results (0.009 seconds)

CVSS: 9.1EPSS: 0%CPEs: 9EXPL: 0

23 Jan 2014 — The OSPF implementation on Enterasys switches and routers does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149. La implementación en switches y routers Enterasys no considera la posibilidad de valores Link State ID duplicados e... • http://www.kb.cert.org/vuls/id/229804 •

CVSS: 10.0EPSS: 78%CPEs: 2EXPL: 1

25 Oct 2012 — Stack-based buffer overflow in the Syslog service (nssyslogd.exe) in Enterasys Network Management Suite (NMS) before 4.1.0.80 allows remote attackers to execute arbitrary code via a long PRIO field in a message to UDP port 514. Desbordamiento de búfer basado en pila en el servicio Syslog (nssyslogd.exe) en Enterasys Network Management Suite (NMS) anteriores a v4.1.0.80, permite a atacantes remotos ejecutar código de su elección a través de un campo PRIO largo en un mensaje UDP sobre el puerto 514 • https://www.exploit-db.com/exploits/23887 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 6%CPEs: 2EXPL: 1

27 Apr 2007 — Stack-based buffer overflow in the TFTPD component in Enterasys NetSight Console 2.1 and NetSight Inventory Manager 2.1, and possibly earlier, allows remote attackers to execute arbitrary code via crafted request packets that contain long file names. Desbordamiento de búfer basado en pila en el componente TFTPD en Enterasys NetSight Console 2.1 y NetSight Inventory Manager 2.1, y posiblemente anteriores, permite a atacantes remotos ejecutar código de su elección a través de paquetes de respuestas manipulada... • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=506 •

CVSS: 7.8EPSS: 1%CPEs: 2EXPL: 0

27 Apr 2007 — The BOOTPD component in Enterasys NetSight Console 2.1 and NetSight Inventory Manager 2.1, and possibly earlier, on Windows allows remote attackers to cause a denial of service (daemon crash) via a UDP packet that contains an invalid "packet type" field. El componente BOOTPD en Enterasys NetSight Console 2.1 y NetSight Inventory Manager 2.1, y posiblemente anteriores, sobre Windows permite a atacantes remotos provocar denegación de servicio (caida de demonio) a través de un paquete UDP que contiene un campo... • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=506 •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

16 Jun 2005 — Enterasys Vertical Horizon VH-2402S before firmware 2.05.05.09 has a hard-coded account and password for debugging, which allows remote attackers to gain privileges. • http://secunia.com/advisories/15757 •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

16 Jun 2005 — Enterasys Vertical Horizon VH-2402S before firmware 2.05.05.09 does not properly restrict certain debugging commands to the ADMIN account, which could allow attackers to obtain sensitive information or modify the registry. • http://secunia.com/advisories/15757 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

13 Jul 2004 — Enterasys XSR-1800 series Security Routers, when running firmware 7.0.0.0 and using Policy-Based Routing, allow remote attackers to cause a denial of service (crash) via a packet with the IP record route option set. • http://marc.info/?l=bugtraq&m=108886995627906&w=2 •

CVSS: 7.5EPSS: 6%CPEs: 2EXPL: 3

02 Apr 2003 — The MPS functionality in Enterasys SSR8000 (Smart Switch Router) before firmware 8.3.0.10 allows remote attackers to cause a denial of service (crash) via multiple port scans to ports 15077 and 15078. La funcionalidad MPS en Enterasys SSR8000 (Smart Switch Router) con firmware anterior a 8.3.0.10 permite a atacantes remotos causar una denegación de servicio (caída) mediante múltiples escaneos de puertos a puertos 15077 y 15078. • https://www.exploit-db.com/exploits/21791 •

CVSS: 7.5EPSS: 14%CPEs: 8EXPL: 1

12 Oct 2001 — Various Intrusion Detection Systems (IDS) including (1) Cisco Secure Intrusion Detection System, (2) Cisco Catalyst 6000 Intrusion Detection System Module, (3) Dragon Sensor 4.x, (4) Snort before 1.8.1, (5) ISS RealSecure Network Sensor 5.x and 6.x before XPU 3.2, and (6) ISS RealSecure Server Sensor 5.5 and 6.0 for Windows, allow remote attackers to evade detection of HTTP attacks via non-standard "%u" Unicode encoding of ASCII characters in the requested URL. • https://www.exploit-db.com/exploits/21100 •