4 results (0.004 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in the Proxim Wireless Tsunami MP.11 2411 with firmware 3.0.3 allows remote authenticated users to inject arbitrary web script or HTML via the system.sysName.0 SNMP OID. Vulnerablidad de secuencias de comandos en sitios cruzados (XSS) en el software empotrado (firmware) Proxim Wireless Tsunami MP.11 2411 v3.0.3 permite a usuarios remotos autenticados inyectar web script o HTML a través de system.sysName.0 SNMP OID. • https://www.exploit-db.com/exploits/32469 http://securityreason.com/securityalert/4884 http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-24 http://www.securityfocus.com/archive/1/497182/100/0/threaded http://www.securityfocus.com/bid/31666 https://exchange.xforce.ibmcloud.com/vulnerabilities/45797 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

The Proxim Wireless Tsunami MP.11 2411 with firmware 3.0.3 has public as its default SNMP read/write community, which makes it easier for remote attackers to obtain sensitive information or modify SNMP variables. Proxim Wireless Tsunami MP.11 2411 con el software empotrado 3.0.3 tienen su comunidad de leer/escribir SNMP pública, lo que facilita a atacantes remotos la obtención de información sensible o la modificación de variables SNMP. • http://securityreason.com/securityalert/4884 http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-24 http://www.securityfocus.com/archive/1/497182/100/0/threaded • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 0%CPEs: 16EXPL: 0

Wireless Access Points (AP) for (1) Avaya AP-3 through AP-6 2.5 to 2.5.4, and AP-7/AP-8 2.5 and other versions before 3.1, and (2) Proxim AP-600 and AP-2000 before 2.5.5, and Proxim AP-700 and AP-4000 after 2.4.11 and before 3.1, use a static WEP key of "12345", which allows remote attackers to bypass authentication. • http://keygen.proxim.com/support/cs/Documents/802.1x_vulnerability.pdf http://secunia.com/advisories/18047 http://secunia.com/advisories/18057 http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf http://www.osvdb.org/22091 http://www.vupen.com/english/advisories/2005/2931 •

CVSS: 6.4EPSS: 0%CPEs: 6EXPL: 1

Information leak in Compaq WL310, and the Orinoco Residential Gateway access point it is based on, uses a system identification string as a default SNMP read/write community string, which allows remote attackers to obtain and modify sensitive configuration information by querying for the identification string. • https://www.exploit-db.com/exploits/21699 http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0066.html http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0075.html http://www.iss.net/security_center/static/9810.php http://www.securityfocus.com/bid/5436 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •