Page 3 of 15 results (0.002 seconds)

CVSS: 7.8EPSS: 1%CPEs: 15EXPL: 0

Cisco ONS 15310-CL, 15310-MA, 15327, 15454, 15454 SDH, and 15600 with software 7.0.2 through 7.0.6, 7.2.2, 8.0.x, 8.5.1, and 8.5.2 allows remote attackers to cause a denial of service (control-card reset) via a crafted TCP session. Cisco ONS 15310-CL, 15310-MA, 15327, 15454, 15454 SDH, y 15600 con software v7.0.2 hasta v7.0.6, v7.2.2, v8.0.x, v8.5.1, y v8.5.2 permite a atacantes remotos causar una denegación de servicio (reinicio de tarjeta de control) mediante una sesión TCP manipulada. • http://securitytracker.com/id?1021592 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4fa.shtml http://www.securityfocus.com/bid/33261 http://www.vupen.com/english/advisories/2009/0139 https://exchange.xforce.ibmcloud.com/vulnerabilities/47940 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 13%CPEs: 24EXPL: 0

The installation of Cisco Transport Controller (CTC) for Cisco Optical Networking System (ONS) 15000 series nodes adds a Java policy file entry with a wildcard that grants the java.security.AllPermission permission to any http URL containing "fs/LAUNCHER.jar", which allows remote attackers to execute arbitrary code on a CTC workstation, aka bug ID CSCea25049. • http://secunia.com/advisories/19553 http://securitytracker.com/id?1015871 http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml http://www.osvdb.org/24438 http://www.securityfocus.com/bid/17384 http://www.vupen.com/english/advisories/2006/1256 https://exchange.xforce.ibmcloud.com/vulnerabilities/25647 •

CVSS: 5.0EPSS: 6%CPEs: 24EXPL: 0

Control cards for Cisco Optical Networking System (ONS) 15000 series nodes before 20060405 allow remote attackers to cause a denial of service (card reset) via (1) a "crafted" IP packet to a device with secure mode EMS-to-network-element access, aka bug ID CSCsc51390; (2) a "crafted" IP packet to a device with IP on the LAN interface, aka bug ID CSCsd04168; and (3) a "malformed" OSPF packet, aka bug ID CSCsc54558. • http://secunia.com/advisories/19553 http://securitytracker.com/id?1015872 http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml http://www.osvdb.org/24435 http://www.osvdb.org/24436 http://www.osvdb.org/24437 http://www.securityfocus.com/bid/17384 http://www.vupen.com/english/advisories/2006/1256 https://exchange.xforce.ibmcloud.com/vulnerabilities/25644 https://exchange.xforce.ibmcloud.com/vulnerabilities/25645 https://exchange.xforce.ibmcloud.com/vulnerabilities/2564 •

CVSS: 7.8EPSS: 2%CPEs: 24EXPL: 2

Control cards for Cisco Optical Networking System (ONS) 15000 series nodes before 20060405 allow remote attackers to cause a denial of service (memory exhaustion and possibly card reset) by sending an invalid response when the final ACK is expected, aka bug ID CSCei45910. • http://secunia.com/advisories/19553 http://securitytracker.com/id?1015872 http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml http://www.osvdb.org/24434 http://www.securityfocus.com/bid/17384 http://www.vupen.com/english/advisories/2006/1256 https://exchange.xforce.ibmcloud.com/vulnerabilities/25643 •

CVSS: 7.8EPSS: 79%CPEs: 176EXPL: 4

Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full. Cisco IOS 11.x y 12.0 a 12.2 permite a atacantes remotos causar una denegación de servicio (bloqueo de tráfico) enviando una cierta secuencia de paquetes IPv4 a una interfaz del dispositivo, causando que la cola de entrada de ese interfaz sea marcada como llena. • https://www.exploit-db.com/exploits/60 https://www.exploit-db.com/exploits/59 https://www.exploit-db.com/exploits/62 http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006743.html http://www.cert.org/advisories/CA-2003-15.html http://www.cert.org/advisories/CA-2003-17.html http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml http://www.kb.cert.org/vuls/id/411332 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre& • CWE-20: Improper Input Validation •