Page 7 of 39 results (0.008 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Alcatel 4400 installs the /chetc/shutdown command with setgid privileges, which allows many different local users to shut down the system. Alcatel 4400 instala el comando /chetc/shutdown con privilegios setgid, lo que permite a muchos usuarios locales apagar el sistema. • http://marc.info/?l=bugtraq&m=101413767925869&w=2 http://www.securityfocus.com/bid/4130 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Alcatel OmniPCX 4400 installs files with world-writable permissions, which allows local users to reconfigure the system and possibly gain privileges. Alcatel OmniPCX 4400 instala ficheros con permisos de escritura para todos los usuarios, lo que permite a usuarios locales reconfigurar el sistema y posiblemente ganar privilegios. • http://marc.info/?l=bugtraq&m=101413767925869&w=2 http://www.securityfocus.com/bid/4133 •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 0

FTP service in Alcatel OmniPCX 4400 allows the "halt" user to gain root privileges by modifying root's .profile file. El servicio FTP en Alcatel OmniPCX 4400 permite al usuario "halt" ganar privilegios de root modificando el fichero de root .profile. • http://marc.info/?l=bugtraq&m=101413767925869&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/8225 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Alcatel Speed Touch Home ADSL Modem allows remote attackers to cause a denial of service (reboot) via a network scan with unusual packets, such as nmap with OS detection. el modem de Alcatel Speed Touch Home ADSL permite e atacantes remotos causar una negación de servicio (reboot) via a scaneo de la red con paquetes anormales, como nmap con detección de OS • http://online.securityfocus.com/archive/1/249746 http://www.iss.net/security_center/static/7893.php http://www.securityfocus.com/bid/3851 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Alcatel ADSL modems allow remote attackers to access the Trivial File Transfer Protocol (TFTP) to modify firmware and configuration via a bounce attack from a system on the local area network (LAN) side, which is allowed to access TFTP without authentication. • http://www.cert.org/advisories/CA-2001-08.html http://www.kb.cert.org/vuls/id/211736 https://exchange.xforce.ibmcloud.com/vulnerabilities/6336 •