Page 2 of 20 results (0.398 seconds)

CVSS: 7.5EPSS: 2%CPEs: 76EXPL: 0

21 Jul 2004 — Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption). Cisco Internetwork Operating System (IOS) 12.0S a 12.3T intenta procesar operaciones SNMP solicitadas en puertos inapropiados (UDP 162 y un puerto UDP escogido aleatoriamente), lo que permite a atacantes remotos causar una denegación de servicio ... • http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml •

CVSS: 10.0EPSS: 0%CPEs: 10EXPL: 0

18 Mar 2004 — Unknown vulnerability in Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS15600 before 1.3(0) allows a superuser whose account is locked out, disabled, or suspended to gain unauthorized access via a Telnet connection to the VxWorks shell. Vulnerabilidad desconocida en Cisco ONS 15327 anteriores a 4.1(3), ONS 15454 anteriores a 4.6(1), ONS 15454 SD anteriores a 4.1(3), y Cisco ONS15600 anteriores a 1.3(0) permiten a un superusuario cuya cuenta está bloquada, de... • http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml •

CVSS: 7.8EPSS: 80%CPEs: 176EXPL: 4

25 Jul 2003 — Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full. Cisco IOS 11.x y 12.0 a 12.2 permite a atacantes remotos causar una denegación de servicio (bloqueo de tráfico) enviando una cierta secuencia de paquetes IPv4 a una interfaz del dispositivo, causando que la cola de entrada de ese interfaz sea marcada como llena. • https://www.exploit-db.com/exploits/60 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

18 Mar 2003 — Cisco ONS15454 and ONS15327 running ONS before 3.4 have an account for the VxWorks Operating System in the TCC, TCC+ and XTC that cannot be changed or disabled, which allows remote attackers to gain privileges by connecting to the account via Telnet. • http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

18 Mar 2003 — Cisco ONS15454 and ONS15327 running ONS before 3.4 uses a "public" SNMP community string that cannot be changed, which allows remote attackers to obtain sensitive information. • http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

18 Mar 2003 — Cisco ONS15454 and ONS15327 running ONS before 3.4 allows remote attackers to modify the system configuration and delete files by establishing an FTP connection to the TCC, TCC+ or XTC using a username and password that does not exist. • http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml •

CVSS: 9.8EPSS: 0%CPEs: 5EXPL: 0

18 Mar 2003 — Cisco ONS15454 and ONS15327 running ONS before 3.4 stores usernames and passwords in cleartext in the image database for the TCC, TCC+ or XTC, which could allow attackers to gain privileges by obtaining the passwords from the image database or a backup. • http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

18 Mar 2003 — Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset) via an HTTP request to the TCC, TCC+ or XTC, in which the request contains an invalid CORBA Interoperable Object Reference (IOR). • http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

18 Mar 2003 — Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset to TCC, TCC+, TCCi or XTC) via a malformed HTTP request that does not contain a leading / (slash) character. • http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

04 Oct 2002 — Cisco ONS15454 optical transport platform running ONS 3.1.0 to 3.2.0 allows remote attackers to cause a denial of service (reset) by sending IP packets with non-zero Type of Service (TOS) bits to the Timing Control Card (TCC) LAN interface. • http://www.cisco.com/warp/public/707/ons-tos-vuln-pub.shtml •