Page 4 of 20 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

Cisco ONS15454 and ONS15327 running ONS before 3.4 allows remote attackers to modify the system configuration and delete files by establishing an FTP connection to the TCC, TCC+ or XTC using a username and password that does not exist. • http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10505.php http://www.securityfocus.com/bid/6076 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset to TCC, TCC+, TCCi or XTC) via a malformed HTTP request that does not contain a leading / (slash) character. • http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10509.php http://www.securityfocus.com/bid/6082 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

Cisco ONS15454 and ONS15327 running ONS before 3.4 uses a "public" SNMP community string that cannot be changed, which allows remote attackers to obtain sensitive information. • http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10507.php http://www.securityfocus.com/bid/6081 •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

Cisco ONS15454 and ONS15327 running ONS before 3.4 have an account for the VxWorks Operating System in the TCC, TCC+ and XTC that cannot be changed or disabled, which allows remote attackers to gain privileges by connecting to the account via Telnet. • http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10510.php http://www.securityfocus.com/bid/6083 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Cisco ONS15454 optical transport platform running ONS 3.1.0 to 3.2.0 allows remote attackers to cause a denial of service (reset) by sending IP packets with non-zero Type of Service (TOS) bits to the Timing Control Card (TCC) LAN interface. • http://www.cisco.com/warp/public/707/ons-tos-vuln-pub.shtml http://www.iss.net/security_center/static/9377.php http://www.securityfocus.com/bid/5058 •