Page 2 of 8 results (0.007 seconds)

CVSS: 7.5EPSS: 1%CPEs: 23EXPL: 0

The Transaction Language 1 (TL1) login interface in Cisco ONS 15327 4.6(0) and 4.6(1) and 15454 and 15454 SDH 4.6(0) and 4.6(1), when a user account is configured with a blank password, allows remote attackers to gain unauthorized access by logging in with a password larger than 10 characters. • http://secunia.com/advisories/12117 http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml http://www.kb.cert.org/vuls/id/760432 http://www.securityfocus.com/bid/10768 https://exchange.xforce.ibmcloud.com/vulnerabilities/16766 •

CVSS: 5.0EPSS: 1%CPEs: 23EXPL: 0

Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via a large number of TCP connections with an invalid response instead of the final ACK (TCP-ACK). • http://secunia.com/advisories/12117 http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml http://www.kb.cert.org/vuls/id/277048 http://www.securityfocus.com/bid/10768 https://exchange.xforce.ibmcloud.com/vulnerabilities/16763 •

CVSS: 5.0EPSS: 1%CPEs: 23EXPL: 0

Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, and ONS 15600 1.x(x), allows remote attackers to cause a denial of service (control card reset) via malformed (1) TCP and (2) UDP packets. • http://secunia.com/advisories/12117 http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml http://www.kb.cert.org/vuls/id/486224 http://www.kb.cert.org/vuls/id/800384 http://www.securityfocus.com/bid/10768 https://exchange.xforce.ibmcloud.com/vulnerabilities/16762 https://exchange.xforce.ibmcloud.com/vulnerabilities/16764 •