Lucene search

K
Red-m1050ap Lan Acess Point

6 matches found

CVE
CVE
added 2004/09/01 4:0 a.m.40 views

CVE-2002-0397

Red-M 1050 (Bluetooth Access Point) publicizes its name, IP address, and other information in UDP packets to a broadcast address, which allows any system on the network to obtain potentially sensitive information about the Access Point device by monitoring UDP port 8887.

5CVSS6AI score0.0035EPSS
CVE
CVE
added 2004/09/01 4:0 a.m.40 views

CVE-2002-0398

Red-M 1050 (Bluetooth Access Point) PPP server allows bonded users to cause a denial of service and possibly execute arbitrary code via a long user name.

10CVSS7.6AI score0.00817EPSS
CVE
CVE
added 2004/09/01 4:0 a.m.39 views

CVE-2002-0395

The TFTP server for Red-M 1050 (Bluetooth Access Point) can not be disabled and makes it easier for remote attackers to crack the administration password via brute force methods.

10CVSS6.8AI score0.01214EPSS
CVE
CVE
added 2004/09/01 4:0 a.m.37 views

CVE-2002-0396

The web management server for Red-M 1050 (Bluetooth Access Point) does not use session-based credentials to authenticate users, which allows attackers to connect to the server from the same IP address as a user who has already established a session.

7.5CVSS6.6AI score0.00527EPSS
CVE
CVE
added 2002/07/26 4:0 a.m.32 views

CVE-2002-0393

Buffer overflow in Red-M 1050 (Bluetooth Access Point) management web interface allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long administration password.

10CVSS8AI score0.03153EPSS
CVE
CVE
added 2003/04/02 5:0 a.m.31 views

CVE-2002-0394

Red-M 1050 (Bluetooth Access Point) uses case insensitive passwords, which makes it easier for attackers to conduct a brute force guessing attack due to the smaller space of possible passwords.

10CVSS6.5AI score0.00697EPSS