3 results (0.006 seconds)

CVSS: 4.3EPSS: 0%CPEs: 15EXPL: 0

SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device's encrypted communications via a specially crafted packet. SEIL/X 4.60 a 5.72, SEIL/B1 4.60 a 5.72, SEIL/x86 3.20 a 5.72 y SEIL/BPV4 5.00 a 5.72 permite que atacantes remotos provoquen un fallo temporal de las comunicaciones cifradas del dispositivo mediante un paquete especialmente manipulado. • http://www.seil.jp/support/security/a01811.html https://jvn.jp/en/jp/JVN76692689/index.html •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets. SEIL/x86 Fuji 1.70 a 5.62, SEIL/BPV4 5.00 a 5.62, SEIL/X1 1.30 a 5.62, SEIL/X2 1.30 a 5.62 y SEIL/B1 1.00 a 5.62 permiten a los atacantes remotos causar una denegación de servicio a través de paquetes UDP IPv4 especialmente diseñados. • http://jvn.jp/en/jp/JVN86171513/index.html http://www.seil.jp/support/security/a01783.html • CWE-20: Improper Input Validation •

CVSS: 2.6EPSS: 0%CPEs: 138EXPL: 0

SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session. Los routers SEIL con firmware SEIL/x86 1.00 hasta la 2.35, SEIL/X1 2.30 hasta la 3.75, SEIL/X2 2.30 hasta la 3.75, y SEIL/B1 2.30 hasta la 3.75, si las funcionalidades http-proxy y application-gateway están activas, no manejan apropiadamente el comando CONNECT, lo que permite a atacantes remotos evitar las restricciones previstas de URL a través de una sesión TCP. • http://jvn.jp/en/jp/JVN24646833/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059 http://www.seil.jp/support/security/a01232.html •