Vulnerabilities > IIJ > Medium

DATE CVE VULNERABILITY TITLE RISK
2018-06-26 CVE-2018-0584 Information Exposure vulnerability in IIJ Smartkey 2.1.0
IIJ SmartKey App for Android version 2.1.0 and earlier allows remote attackers to bypass authentication [effect_of_bypassing_authentication] via unspecified vectors.
network
low complexity
iij CWE-200
5.0
2014-12-05 CVE-2014-7255 Resource Exhaustion vulnerability in IIJ products
Internet Initiative Japan Inc.
network
low complexity
iij CWE-400
5.0
2014-06-16 CVE-2014-2004 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in IIJ products
The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet.
network
low complexity
iij CWE-119
5.0
2013-10-01 CVE-2013-4708 Cryptographic Issues vulnerability in IIJ products
The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc.
network
high complexity
iij CWE-310
4.0
2013-09-20 CVE-2013-4709 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in IIJ products
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message.
network
iij CWE-119
6.8
2010-08-30 CVE-2010-2363 Permissions, Privileges, and Access Controls vulnerability in IIJ products
The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.
network
iij CWE-264
5.8