Page 2 of 11 results (0.009 seconds)

CVSS: 7.5EPSS: 1%CPEs: 23EXPL: 0

The Transaction Language 1 (TL1) login interface in Cisco ONS 15327 4.6(0) and 4.6(1) and 15454 and 15454 SDH 4.6(0) and 4.6(1), when a user account is configured with a blank password, allows remote attackers to gain unauthorized access by logging in with a password larger than 10 characters. • http://secunia.com/advisories/12117 http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml http://www.kb.cert.org/vuls/id/760432 http://www.securityfocus.com/bid/10768 https://exchange.xforce.ibmcloud.com/vulnerabilities/16766 •

CVSS: 5.0EPSS: 1%CPEs: 23EXPL: 0

Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via a large number of TCP connections with an invalid response instead of the final ACK (TCP-ACK). • http://secunia.com/advisories/12117 http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml http://www.kb.cert.org/vuls/id/277048 http://www.securityfocus.com/bid/10768 https://exchange.xforce.ibmcloud.com/vulnerabilities/16763 •

CVSS: 5.0EPSS: 1%CPEs: 23EXPL: 0

Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, and ONS 15600 1.x(x), allows remote attackers to cause a denial of service (control card reset) via malformed (1) TCP and (2) UDP packets. • http://secunia.com/advisories/12117 http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml http://www.kb.cert.org/vuls/id/486224 http://www.kb.cert.org/vuls/id/800384 http://www.securityfocus.com/bid/10768 https://exchange.xforce.ibmcloud.com/vulnerabilities/16762 https://exchange.xforce.ibmcloud.com/vulnerabilities/16764 •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), and ONS 15454 SD before 4.1(3) allows remote attackers to cause a denial of service (reset) by not sending the ACK portion of the TCP three-way handshake and sending an invalid response instead. Cisco ONS 15327 anteriores a 4.1(3), ONS 15454 anteriores a 4.6(1), y ONS 15454 SD anteriores a 4.1(3) permiten a atacantes remotos causar una denegación de servicio (caída) no enviando la porción ACK del establecimiento de conexión en TCP 3 pasos, y enviando en su lugar una respuesta no válida. • http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml http://www.osvdb.org/4009 http://www.securityfocus.com/bid/9699 https://exchange.xforce.ibmcloud.com/vulnerabilities/15265 •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS 15600 before 1.3(0) enable TFTP service on UDP port 69 by default, which allows remote attackers to GET or PUT ONS system files on the current active TCC in the /flash0 or /flash1 directories. Cisco ONS 15327 anteriores a 4.1(3), ONS 15454 anteriores a 4.6(1), ONS 15454 SD anteriores a 4.1(3), y Cisco ONS 15600 anteriores a 1.3(0) tienen activo el servicio TFTP en el puerto UDP 69 por defecto, lo que permite a atacantes remotos obtener (GET) o poner (PUT ON) ficheros de sistema en TCC activo acual en los directorios /flash0 y /flash1. • http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml http://www.securityfocus.com/bid/9699 https://exchange.xforce.ibmcloud.com/vulnerabilities/15264 •