Filtered by vendor Red-m
Subscriptions
Total
9 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2002-0395 | 1 Red-m | 1 1050ap Lan Acess Point | 2024-08-08 | N/A |
The TFTP server for Red-M 1050 (Bluetooth Access Point) can not be disabled and makes it easier for remote attackers to crack the administration password via brute force methods. | ||||
CVE-2002-0398 | 1 Red-m | 1 1050ap Lan Acess Point | 2024-08-08 | N/A |
Red-M 1050 (Bluetooth Access Point) PPP server allows bonded users to cause a denial of service and possibly execute arbitrary code via a long user name. | ||||
CVE-2002-0397 | 1 Red-m | 1 1050ap Lan Acess Point | 2024-08-08 | N/A |
Red-M 1050 (Bluetooth Access Point) publicizes its name, IP address, and other information in UDP packets to a broadcast address, which allows any system on the network to obtain potentially sensitive information about the Access Point device by monitoring UDP port 8887. | ||||
CVE-2002-0394 | 1 Red-m | 1 1050ap Lan Acess Point | 2024-08-08 | N/A |
Red-M 1050 (Bluetooth Access Point) uses case insensitive passwords, which makes it easier for attackers to conduct a brute force guessing attack due to the smaller space of possible passwords. | ||||
CVE-2002-0393 | 1 Red-m | 1 1050ap Lan Acess Point | 2024-08-08 | N/A |
Buffer overflow in Red-M 1050 (Bluetooth Access Point) management web interface allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long administration password. | ||||
CVE-2002-0396 | 1 Red-m | 1 1050ap Lan Acess Point | 2024-08-08 | N/A |
The web management server for Red-M 1050 (Bluetooth Access Point) does not use session-based credentials to authenticate users, which allows attackers to connect to the server from the same IP address as a user who has already established a session. | ||||
CVE-2004-2080 | 1 Red-m | 1 Red-alert | 2024-08-08 | N/A |
Red-M Red-Alert 2.7.5 with software 3.1 build 24 converts multiple spaces in a Service Set Identifier (SSID) to a single space, which prevents Red-Alert from correctly identifying the SSID. | ||||
CVE-2004-2078 | 1 Red-m | 1 Red-alert | 2024-08-08 | N/A |
Red-M Red-Alert 2.7.5 with software 3.1 build 24 allows remote attackers to cause a denial of service (reboot and loss of logged events) via a long request to TCP port 80, possibly triggering a buffer overflow. | ||||
CVE-2004-2079 | 1 Red-m | 1 Red-alert | 2024-08-08 | N/A |
Red-M Red-Alert 2.7.5 with software 3.1 build 24 binds authentication to IP addresses, which allows remote attackers to bypass authentication by connecting from the same IP address as an active authenticated user. |
Page 1 of 1.