Page 2 of 39 results (0.009 seconds)

CVSS: 6.8EPSS: 2%CPEs: 17EXPL: 4

Cross-site request forgery (CSRF) vulnerability in sec/content/sec_asa_users_local_db_add.html in the management web interface in Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, 6855, 6900, 10K, and 6860 with firmware 6.4.5.R02, 6.4.6.R01, 6.6.4.R01, 6.6.5.R02, 7.3.2.R01, 7.3.3.R01, 7.3.4.R01, and 8.1.1.R01 allows remote attackers to hijack the authentication of administrators for requests that create users via a crafted request. Vulnerabilidad de CSRF en sec/content/sec_asa_users_local_db_add.html en la interfaz de gestión en Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, 6855, 6900, 10K, y 6860 con firmware 6.4.5.R02, 6.4.6.R01, 6.6.4.R01, 6.6.5.R02, 7.3.2.R01, 7.3.3.R01, 7.3.4.R01, y 8.1.1.R01 permite a atacantes remotos secuestrar la autenticación de administradores para solicitudes que crean usuarios a través de una solicitud manipulada. During a penetration test, RedTeam Pentesting discovered a vulnerability in the management web interface of an Alcatel-Lucent OmniSwitch 6450. The management web interface has no protection against cross-site request forgery attacks. This allows specially crafted web pages to change the switch configuration and create users, if an administrator accesses the website while being authenticated in the management web interface. • https://www.exploit-db.com/exploits/37261 http://packetstormsecurity.com/files/132236/Alcatel-Lucent-OmniSwitch-Web-Interface-Cross-Site-Request-Forgery.html http://seclists.org/fulldisclosure/2015/Jun/23 http://www.securityfocus.com/archive/1/535732/100/0/threaded http://www.securityfocus.com/bid/75121 http://www.securitytracker.com/id/1032544 https://www.redteam-pentesting.de/advisories/rt-sa-2015-004 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 4.3EPSS: 1%CPEs: 10EXPL: 3

The management web interface in Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, and 6855 with firmware before 6.6.4.309.R01 and 6.6.5.x before 6.6.5.80.R02 generates weak session identifiers, which allows remote attackers to hijack arbitrary sessions via a brute force attack. La gestión de la interfaz web en Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400 y 6855 con firmware en versiones anteriores a 6.6.4.309.R01 y 6.6.5.x en versiones anteriores a 6.6.5.80.R02 genera identificadores de sesión débiles, lo que permite a atacantes remotos secuestrar sesiones arbitrarias a través de un ataque de fuerza bruta. During a penetration test, RedTeam Pentesting discovered a vulnerability in the management web interface of an Alcatel-Lucent OmniSwitch 6450. This interface uses easily guessable session IDs, which allows attackers to authenticate as a currently logged-in user and perform administrative tasks. • http://packetstormsecurity.com/files/132235/Alcatel-Lucent-OmniSwitch-Web-Interface-Weak-Session-ID.html http://seclists.org/fulldisclosure/2015/Jun/22 http://www.securityfocus.com/archive/1/535731/100/0/threaded http://www.securityfocus.com/bid/75125 https://www.redteam-pentesting.de/en/advisories/rt-sa-2015-003/-alcatel-lucent-omniswitch-web-interface-weak-session-id • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in the signin functionality of ics in MyTeamwork services in Alcatel-Lucent Omnitouch 8660 My Teamwork before 6.7, Omnitouch 8670 Automated Message Delivery System (AMDS) before 6.7, Omnitouch 8460 Advanced Communication Server before 9.1, and OmniTouch 8400 Instant Communications Suite before 6.7.3 (1) allow remote attackers to inject arbitrary web script or HTML via a crafted URL that results in a reflected XSS or (2) allow user-assisted remote attackers to inject arbitrary web script or HTML via a user's personal bookmark entry that results in a stored XSS via unspecified vectors. Múltiples vulnerabilidades XSS en la funcionalidad de firmado de ics en los servicios MyTeamwork en Alcatel-Lucent Omnitouch 8660 My Teamwork anterior a 6.7, Omnitouch 8670 Automated Message Delivery System (AMDS) anterior a 6.7, Omnitouch 8460 Advanced Communication Server anterior a 9.1, y OmniTouch 8400 Instant Communications Suite anterior a 6.7.3 (1) permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarias a través de una URL que resulta en un XSS reflejado o (2) permite a atacantes remotos asistidos por el usuario inyectar secuencias de comandos web o HTML a través de una entrada en los favoritos que resulta en un XSS almacenado. No se han especificado los vectores. • http://osvdb.org/94810 http://osvdb.org/94811 http://secunia.com/advisories/54000 http://www.securityfocus.com/bid/60902 http://www3.alcatel-lucent.com/wps/DocumentStreamerServlet?LMSG_CABINET=Corporate&LMSG_CONTENT_FILE=Support/Security/2013001.htm https://exchange.xforce.ibmcloud.com/vulnerabilities/85382 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 3.3EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in the NMS server in Alcatel-Lucent OmniVista 4760 R5.1.06.03 and earlier allows remote attackers to read arbitrary files via directory traversal sequences in HTTP GET requests, related to the lang variable. Vulnerabilidad de salto de directorio en el servidor NMS en Alcatel-Lucent OmniVista 4760 R5.1.06.03 y anteriores, permite a atacantes remotos leer ficheros locales de su elección al utilizar secuencias transversales en peticiones HTTP GET, relacionado con la variable lang. • http://seclists.org/fulldisclosure/2011/Mar/8 http://secunia.com/advisories/43507 http://securityreason.com/securityalert/8122 http://www.alcatel-lucent.com/wps/DocumentStreamerServlet?LMSG_CABINET=Corporate&LMSG_CONTENT_FILE=Support/Security/2011002.pdf http://www.securityfocus.com/archive/1/516768/100/0/threaded http://www.securityfocus.com/bid/46624 http://www.vupen.com/english/advisories/2011/0548 https://exchange.xforce.ibmcloud.com/vulnerabilities/65848 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.8EPSS: 4%CPEs: 6EXPL: 0

Multiple stack-based buffer overflows in unspecified CGI programs in the Unified Maintenance Tool web interface in the embedded web server in the Communication Server (CS) in Alcatel-Lucent OmniPCX Enterprise before R9.0 H1.301.50 allow remote attackers to execute arbitrary code via crafted HTTP headers. Desbordamiento de búfer basado en pila en programas CGI no especificados en el interface Web del Unified Maintenance Tool del servidor embebido del Communication Server (CS) en Alcatel-Lucent OmniPCX Enterprise before R9.0 H1.301.50, permite a atacantes remotos ejecutar código de su elección a través de una cabecera HTTP manipulada. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=896 http://secunia.com/advisories/43588 http://www.alcatel-lucent.com/wps/DocumentStreamerServlet?LMSG_CABINET=Corporate&LMSG_CONTENT_FILE=Support/Security/2011001.pdf http://www.securityfocus.com/bid/46640 http://www.vupen.com/english/advisories/2011/0549 https://exchange.xforce.ibmcloud.com/vulnerabilities/65849 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •