Filtered by vendor 3com
                         Subscriptions
                    
                    
                
                    Total
                    41 CVE
                
            | CVE | Vendors | Products | Updated | CVSS v3.1 | 
|---|---|---|---|---|
| CVE-2004-2457 | 1 3com | 1 3crwe754g72-a | 2025-04-03 | N/A | 
| Unspecified vulnerability in 3Com OfficeConnect ADSL 11g Router allows remote attackers to cause a denial of service (crash) via a large amount of UDP traffic. | ||||
| CVE-1999-1336 | 1 3com | 1 Hiperarc | 2025-04-03 | N/A | 
| 3Com HiPer Access Router Card (HiperARC) 4.0 through 4.2.29 allows remote attackers to cause a denial of service (reboot) via a flood of IAC packets to the telnet port. | ||||
| CVE-2005-0278 | 1 3com | 1 3cdaemon | 2025-04-03 | N/A | 
| The FTP service in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to gain sensitive information via a cd command that contains an MS-DOS device name, which reveals the installation path in an error message. | ||||
| CVE-2004-0477 | 1 3com | 1 3cp4144 | 2025-04-03 | N/A | 
| Unknown vulnerability in 3Com OfficeConnect Remote 812 ADSL Router allows remote attackers to bypass authentication via repeated attempts using any username and password. NOTE: this identifier was inadvertently re-used for another issue due to a typo; that issue was assigned CVE-2004-0447. This candidate is ONLY for the ADSL router bypass. | ||||
| CVE-2005-0277 | 1 3com | 1 3cdaemon | 2025-04-03 | N/A | 
| Buffer overflow in the FTP service in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via (1) a long username in the USER command or (2) an FTP command that contains a long argument, such as cd, send, or ls. | ||||
| CVE-2005-2391 | 1 3com | 1 3crwe454g72 | 2025-04-03 | N/A | 
| Unknown vulnerability in 3Com OfficeConnect Wireless 11g Access Point before 1.03.12 allows remote attackers to obtain sensitive information via the web interface. | ||||
| CVE-2005-2020 | 1 3com | 1 3c15100d | 2025-04-03 | N/A | 
| Directory traversal vulnerability in the web server for 3Com Network Supervisor 5.0.2 allows remote attackers to read arbitrary files via ".." sequences in the URL to TCP port 21700. | ||||
| CVE-2006-3678 | 1 3com | 1 Tippingpoint Ips Tos | 2025-04-03 | N/A | 
| TippingPoint IPS running the TippingPoint Operating System (TOS) before 2.2.4.6519 allows remote attackers to "force the device into layer 2 fallback (L2FB)", causing a denial of service (page fault), via a malformed packet. | ||||
| CVE-2006-0993 | 1 3com | 1 Tippingpoint Sms Server | 2025-04-03 | N/A | 
| The web management interface in 3Com TippingPoint SMS Server before 2.2.1.4478 does not restrict access to certain directories, which might allow remote attackers to obtain potentially sensitive information such as configuration settings. | ||||
| CVE-2005-0276 | 1 3com | 1 3cdaemon | 2025-04-03 | N/A | 
| Multiple format string vulnerabilities in the FTP service in 3Com 3CDaemon 2.0 revision 10 allow remote attackers to cause a denial of service (application crash) via format string specifiers in (1) the username, (2) cd, (3) delete, (4) rename, (5) rmdir, (6) literal, (7) stat, or (8) CWD commands. | ||||
| CVE-2001-1293 | 1 3com | 1 3cr29223 | 2025-04-03 | N/A | 
| Buffer overflow in web server of 3com HomeConnect Cable Modem External with USB (#3CR29223) allows remote attackers to cause a denial of service (crash) via a long HTTP request. | ||||
| CVE-2003-0291 | 1 3com | 1 3cp4144 | 2025-04-03 | N/A | 
| 3com OfficeConnect Remote 812 ADSL Router 1.1.7 does not properly clear memory from DHCP responses, which allows remote attackers to identify the contents of previous HTTP requests by sniffing DHCP packets. | ||||
| CVE-2004-0476 | 1 3com | 1 3cp4144 | 2025-04-03 | N/A | 
| Buffer overflow in 3Com OfficeConnect Remote 812 ADSL Router 1.1.9.4 allows remote attackers to cause a denial of service (reboot or packet loss) via a long string containing Telnet escape characters to the Telnet port. | ||||
| CVE-2004-1596 | 1 3com | 1 3cradsl72 | 2025-04-03 | N/A | 
| The 3COM Wireless router 3CRADSL72 running Boot Code 1.3d allows remote attackers to gain sensitive information such as passwords and router settings via a direct HTTP request to app_sta.stm. | ||||
| CVE-2005-0275 | 1 3com | 1 3cdaemon | 2025-04-03 | N/A | 
| TFTP in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to cause a denial of service (application crash) via a GET request containing an MS-DOS device name. | ||||
| CVE-2005-0419 | 1 3com | 1 3cserver | 2025-04-03 | N/A | 
| Multiple heap-based buffer overflows in 3Com 3CServer allow remote authenticated users to execute arbitrary code via long FTP commands, as demonstrated using the STAT command. | ||||
| CVE-2006-0362 | 1 3com | 1 Tippingpoint Ips Tos | 2025-04-03 | N/A | 
| TippingPoint Intrusion Prevention System (IPS) TOS before 2.1.4.6324, and TOS 2.2.x before 2.2.1.6506, allow remote attackers to cause a denial of service (CPU consumption) via an unknown vector, probably involving an HTTP request with a negative number in the Content-Length header. | ||||
| CVE-1999-1389 | 1 3com | 1 Total Control Netserver Card | 2025-04-03 | N/A | 
| US Robotics/3Com Total Control Chassis with Frame Relay between 3.6.22 and 3.7.24 does not properly enforce access filters when the "set host prompt" setting is made for a port, which allows attackers to bypass restrictions by providing the hostname twice at the "host: " prompt. | ||||
| CVE-1999-1513 | 1 3com | 1 Superstack Ii Hub | 2025-04-03 | N/A | 
| Management information base (MIB) for a 3Com SuperStack II hub running software version 2.10 contains an object identifier (.1.3.6.1.4.1.43.10.4.2) that is accessible by a read-only community string, but lists the entire table of community strings, which could allow attackers to conduct unauthorized activities. | ||||
| CVE-2001-0352 | 2 3com, Symbol | 2 3crwe747a, 41x1 Access Point | 2025-04-03 | N/A | 
| SNMP agents in 3Com AirConnect AP-4111 and Symbol 41X1 Access Point allow remote attackers to obtain the WEP encryption key by reading it from a MIB when the value should be write-only, via (1) dot11WEPDefaultKeyValue in the dot11WEPDefaultKeysTable of the IEEE 802.11b MIB, or (2) ap128bWepKeyValue in the ap128bWEPKeyTable in the Symbol MIB. | ||||