RSS   Vulnerabilities for '3cp4144'   RSS

2004-12-06
 
CVE-2004-0477

 

 
Unknown vulnerability in 3Com OfficeConnect Remote 812 ADSL Router allows remote attackers to bypass authentication via repeated attempts using any username and password. NOTE: this identifier was inadvertently re-used for another issue due to a typo; that issue was assigned CVE-2004-0447. This candidate is ONLY for the ADSL router bypass.

 
2004-08-18
 
CVE-2004-0476

 

 
Buffer overflow in 3Com OfficeConnect Remote 812 ADSL Router 1.1.9.4 allows remote attackers to cause a denial of service (reboot or packet loss) via a long string containing Telnet escape characters to the Telnet port.

 
2003-06-16
 
CVE-2003-0291

 

 
3com OfficeConnect Remote 812 ADSL Router 1.1.7 does not properly clear memory from DHCP responses, which allows remote attackers to identify the contents of previous HTTP requests by sniffing DHCP packets.

 
2002-10-04
 
CVE-2002-0888

 

 
3Com OfficeConnect Remote 812 ADSL Router, firmware 1.1.9 and 1.1.7, allows remote attackers to bypass port access restrictions by connecting to an approved port and quickly connecting to the desired port, which is allowed by the router.

 
2001-10-18
 
CVE-2001-0740

 

 
3COM OfficeConnect 812 and 840 ADSL Router 4.2, running OCR812 router software 1.1.9 and earlier, allows remote attackers to cause a denial of service via a long string containing a large number of "%s" strings, possibly triggering a format string vulnerability.

 

 >>> Vendor: 3COM 36 Products
Hiperarc
Total control netserver card
Superstack ii hub
3crwe747a
3c840-us
3cp4144
Superstack ii ps hub
3cr29223
3cdaemon
Webbngss3nbxnts
3cradsl72
3crwe754g72-a
3c17205-us
3c17210-us
Superstack 3 switch
3crwe454g72
3cserver
3c15100d
Tippingpoint ips tos
Tippingpoint sms server
3c16486
3cr860-95
Superstack 3 switch 4400
3ctftpsvc
Tippingpoint ips
3crtpx505-73
3crx506-96
Tippingpoint 200
Tippingpoint 200e
Tippingpoint 2400e
Tippingpoint 50
Tippingpoint 5000e
Tippingpoint 600e
3cnj220
3crwe554g72t
Wireless 8760 dual-radio


Copyright 2024, cxsecurity.com

 

Back to Top