Page 4 of 39 results (0.009 seconds)

CVSS: 10.0EPSS: 14%CPEs: 10EXPL: 0

Stack-based buffer overflow in the Agranet-Emweb embedded management web server in Alcatel OmniSwitch OS7000, OS6600, OS6800, OS6850, and OS9000 Series devices with AoS 5.1 before 5.1.6.463.R02, 5.4 before 5.4.1.429.R01, 6.1.3 before 6.1.3.965.R01, 6.1.5 before 6.1.5.595.R01, and 6.3 before 6.3.1.966.R01 allows remote attackers to execute arbitrary code via a long Session cookie. Desbordamiento de búfer basado en pila en el servidor web de gestión embebido Agranet-Emweb de Alcatel OmniSwitch dispositivos OS7000, OS6600, OS6800, OS6850, y OS9000 Series con AoS 5.1 versiones anteriores a v5.1.6.463.R02, 5.4 versiones anteriores a v5.4.1.429.R01, 6.1.3 versiones anteriores a v6.1.3.965.R01, 6.1.5 versiones anteriores a v6.1.5.595.R01, y 6.3 versiones anteriores a v6.3.1.966.R01 permite a atacantes remotos ejecutar código de su elección a través de una cookie Session. • http://secunia.com/advisories/31435 http://securityreason.com/securityalert/4347 http://www.layereddefense.com/alcatel12aug.html http://www.securityfocus.com/archive/1/495343/100/0/threaded http://www.securityfocus.com/bid/30652 http://www.securitytracker.com/id?1020657 http://www.vupen.com/english/advisories/2008/2346 http://www1.alcatel-lucent.com/psirt/statements/2008002/OmniSwitch.htm https://exchange.xforce.ibmcloud.com/vulnerabilities/44400 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 94%CPEs: 2EXPL: 1

cgi-data/FastJSData.cgi in OmniPCX Office with Internet Access services OXO210 before 210/091.001, OXO600 before 610/014.001, and other versions, allows remote attackers to execute arbitrary commands and "obtain OXO resources" via shell metacharacters in the id2 parameter. El archivo cgi-data/FastJSData.cgi en OmniPCX Office con servicios Internet Access OXO210 versiones anteriores a 210/091.001, OXO600 versiones anteriores a 610/014.001, y otras versiones, permite a los atacantes remotos ejecutar comandos arbitrarios y "obtain OXO resources" por medio de metacaracteres shell en el parámetro id2. • https://www.exploit-db.com/exploits/5662 http://secunia.com/advisories/29798 http://www.securityfocus.com/archive/1/492383/100/0/threaded http://www.securityfocus.com/bid/28758 http://www.securitytracker.com/id?1020082 http://www.vupen.com/english/advisories/2008/1057 http://www1.alcatel-lucent.com/psirt/statements/2008001/OXOrexec.htm https://exchange.xforce.ibmcloud.com/vulnerabilities/41560 • CWE-20: Improper Input Validation •

CVSS: 8.5EPSS: 3%CPEs: 1EXPL: 0

The Communication Server in Alcatel-Lucent OmniPCX Enterprise 7.1 and earlier caches an IP address during a TFTP request from an IP Touch phone, and uses this IP address as the destination for all subsequent VoIP packets to this phone, which allows remote attackers to cause a denial of service (loss of audio) or intercept voice communications via a crafted TFTP request containing the phone's MAC address in the filename. EL Communication Server en Alcatel-Lucent OmniPCX Enterprise 7.1 y anteriores cachea una dirección IP durante una respuesta TFTP desde una IP Touch phone, y utiliza esta dirección IP como el destino para todos los paquetes de subsecuencia VoIP en este teléfono, lo cual podría permitir a atacantes remotos provocar denegación de servicio (pérdida de audio) o interceptar comunicaciones de voz a través de una respuesta TFTP que contiene la dirección MAC del teléfono en el nombre de archivo. • http://osvdb.org/40522 http://secunia.com/advisories/27710 http://securityreason.com/securityalert/3387 http://www.csnc.ch/static/advisory/csnc/alcatel_omnipcx_enterprise_audio_rerouting_vulnerability_v1.0.txt http://www.securityfocus.com/archive/1/483925/100/0/threaded http://www.securityfocus.com/bid/26494 http://www.securitytracker.com/id?1018983 http://www.vupen.com/english/advisories/2007/3919 http://www1.alcatel-lucent.com/psirt/statements/2007004/IPTouchDOS.pdf https://exchange& •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in Alcatel OmniVista 4760 R4.2 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the action parameter to php-bin/Webclient.php or (2) the Langue parameter to the default URI. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Alcatel OmniVista 4760 R4.2 y versiones anteriores permiten a atacantes remotos inyectar scripts web o HTML de su elección mediante (1) el parámetro action en php-bin/Webclient.php ó (2) el parámetro Langue en el URI por defecto. • https://www.exploit-db.com/exploits/30691 http://osvdb.org/37997 http://secunia.com/advisories/27294 http://securityreason.com/securityalert/3280 http://www.s21sec.com/avisos/s21sec-038-en.txt http://www.securityfocus.com/archive/1/482507/100/0/threaded http://www.securityfocus.com/bid/26128 http://www.vupen.com/english/advisories/2007/3541 http://www1.alcatel-lucent.com/psirt/statements/2007003/4760xss.htm • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 3%CPEs: 2EXPL: 0

Multiple cross-site request forgery (CSRF) vulnerabilities in the Thomson/Alcatel SpeedTouch 7G router, as used for the BT Home Hub 6.2.6.B and earlier, allow remote attackers to perform actions as administrators via unspecified POST requests, as demonstrated by enabling an inbound remote-assistance HTTPS session on TCP port 51003. NOTE: an authentication bypass can be leveraged to exploit this in the absence of an existing administrative session. NOTE: SpeedTouch 780 might also be affected by some of these issues. Múltiples vulnerabilidades de tipo cross-site request forgery (CSRF) en el enrutador Thomson/Alcatel SpeedTouch 7G, como es usado por el BT Home Hub versión 6.2.6.B y anteriores, permiten a atacantes remotos realizar acciones como administradores por medio de peticiones POST no especificadas, como es demostrado por una habilitación de una sesión HTTPS de asistencia remota entrante en el puerto TCP 51003. NOTA: una omisión de autenticación puede ser aprovechada para explotar esto en la ausencia de una sesión administrativa existente. • http://securityreason.com/securityalert/3213 http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub http://www.securityfocus.com/archive/1/481835/100/0/threaded http://www.securityfocus.com/bid/25972 http://www.theregister.co.uk/2007/10/09/bt_home_hub_vuln • CWE-352: Cross-Site Request Forgery (CSRF) •