3 results (0.004 seconds)

CVSS: 9.8EPSS: 2%CPEs: 2EXPL: 0

31 Mar 2009 — Nortel UNIStim protocol, as used in Communication Server 1000 and other products, uses predictable sequence numbers, which allows remote attackers to hijack sessions via sniffing or brute force attacks. Protocolo Nortel UNIStim, utilizado en Communication Server 1000 y otros productos, utiliza números de secuencia predecibles, lo que permite a atacantes remotos secuestrar seisiones a través de ataques de rastreo o fuerza bruta. • http://osvdb.org/44379 •

CVSS: 7.5EPSS: 79%CPEs: 296EXPL: 2

31 May 2005 — Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 •

CVSS: 9.8EPSS: 8%CPEs: 3EXPL: 0

15 Jan 2004 — Multiple vulnerabilities in the H.323 protocol implementation for Nortel Networks Business Communications Manager (BCM), Succession 1000 IP Trunk and IP Peer Networking, and 802.11 Wireless IP Gateway allow remote attackers to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol. Múltiples vulnerabilidades en la implementación del protocolo H.323 en Nortel Networks Communications Manager (BCM), Succession 1000 IP Trunk and... • http://www.cert.org/advisories/CA-2004-01.html •