Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
3com vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-0477
Unknown vulnerability in 3Com OfficeConnect Remote 812 ADSL Router allows remote malicious users to bypass authentication via repeated attempts using any username and password. NOTE: this identifier was inadvertently re-used for another issue due to a typo; that issue was assigne...
3com 3cp4144
3com 3cp4144 1.1.9.4
NA
CVE-2002-0888
3Com OfficeConnect Remote 812 ADSL Router, firmware 1.1.9 and 1.1.7, allows remote malicious users to bypass port access restrictions by connecting to an approved port and quickly connecting to the desired port, which is allowed by the router.
3com 3cp4144 1.1.9
3com 3cp4144 1.1.7
NA
CVE-2006-5382
3Com Switch SS3 4400 switches, firmware 5.11, 6.00 and 6.10 and previous versions, allow remote malicious users to read the SNMP Read-Write Community string and conduct unauthorized actions via unspecified "normally restricted management packets on the device" that caus...
3com Superstack 3 Switch 4400 Firmware 5.11
3com Superstack 3 Switch 4400 Firmware 6.00
3com Superstack 3 Switch 4400
NA
CVE-2006-0362
TippingPoint Intrusion Prevention System (IPS) TOS prior to 2.1.4.6324, and TOS 2.2.x prior to 2.2.1.6506, allow remote malicious users to cause a denial of service (CPU consumption) via an unknown vector, probably involving an HTTP request with a negative number in the Content-L...
3com Tippingpoint Ips Tos 2.2.0.6504
3com Tippingpoint Ips Tos
NA
CVE-2007-3701
TippingPoint IPS prior to 20070710 does not properly handle a hex-encoded alternate Unicode '/' (slash) character, which might allow remote malicious users to send certain network traffic and avoid detection, as demonstrated by a cmd.exe attack.
3com Tippingpoint Ips Tos 2.1
3com Tippingpoint Ips Tos 2.2.4
3com Tippingpoint Ips Tos 2.5
3com Tippingpoint Ips Tos 2.5.1
Tippingpoint Tipping Point 50
Tippingpoint Tipping Point 5000e
3com Tippingpoint Ips Tos 2.2.1
3com Tippingpoint Ips Tos 2.2.1.6506
Tippingpoint Tipping Point 200
Tippingpoint Tipping Point 200e
Tippingpoint Tipping Point X505
Tippingpoint Tipping Point X506
3com Tippingpoint Ips Tos 2.2.2
3com Tippingpoint Ips Tos 2.2.3
Tippingpoint Tipping Point 2400e
Tippingpoint Tipping Point 400
Tippingpoint Tipping Point Zpha
3com Tippingpoint Ips Tos 2.1.4.6324
3com Tippingpoint Ips Tos 2.2
Tippingpoint Tipping Point 1200
Tippingpoint Tipping Point 1200e
Tippingpoint Tipping Point 600e
1 EDB exploit
NA
CVE-1999-1336
3Com HiPer Access Router Card (HiperARC) 4.0 up to and including 4.2.29 allows remote malicious users to cause a denial of service (reboot) via a flood of IAC packets to the telnet port.
3com Hiperarc
NA
CVE-2004-1596
The 3COM Wireless router 3CRADSL72 running Boot Code 1.3d allows remote malicious users to gain sensitive information such as passwords and router settings via a direct HTTP request to app_sta.stm.
3com 3cradsl72
1 EDB exploit
NA
CVE-2006-2054
3Com Baseline Switch 2848-SFP Plus Model #3C16486 with firmware prior to 1.0.2.0 allows remote malicious users to cause a denial of service (unstable operation) via long DHCP packets.
3com 3c16486
NA
CVE-2006-6183
Multiple stack-based buffer overflows in 3Com 3CTftpSvc 2.0.1, and possibly earlier, allow remote malicious users to cause a denial of service (crash) or execute arbitrary code via a long mode field (aka transporting mode) in a (1) GET or (2) PUT command.
3com 3ctftpsvc
5 EDB exploits
9.8
CVSSv3
CVE-2001-1291
The telnet server for 3Com hardware such as PS40 SuperStack II does not delay or disconnect remote attackers who provide an incorrect username or password, which makes it easier to break into the server via brute force password guessing.
3com Superstack Ii Ps Hub 40 Firmware -
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »