Search criteria
9 vulnerabilities found for omniswitch by alcatel
VAR-201506-0116
Vulnerability from variot - Updated: 2023-12-18 13:57Cross-site request forgery (CSRF) vulnerability in sec/content/sec_asa_users_local_db_add.html in the management web interface in Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, 6855, 6900, 10K, and 6860 with firmware 6.4.5.R02, 6.4.6.R01, 6.6.4.R01, 6.6.5.R02, 7.3.2.R01, 7.3.3.R01, 7.3.4.R01, and 8.1.1.R01 allows remote attackers to hijack the authentication of administrators for requests that create users via a crafted request. Alcatel OmniSwitch is an enterprise-class switch. Multiple Alcatel-Lucent OmniSwitch products are prone to a cross-site request-forgery vulnerability. An attacker can exploit this issue to perform unauthorized actions in the context of a logged-in user of the affected application. This may aid in other attacks. Alcatel-Lucent OmniSwitch 6450, etc. are switches products of Alcatel-Lucent (Alcatel-Lucent) in France. The following products and versions are affected: using version 6.4.5.R02, version 6.4.6.R01, version 6.6.4.R01, version 6.6.5.R02, version 7.3.2.R01, version 7.3.3.R01, Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, 6855, 6900, 10K, 6860 with firmware 7.3.4.R01 and 8.1.1.R01
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201506-0116",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "omniswitch",
"scope": "eq",
"trust": 1.4,
"vendor": "alcatel lucent",
"version": "6.4.5.r02"
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 1.4,
"vendor": "alcatel lucent",
"version": "6.4.6.r01"
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 1.4,
"vendor": "alcatel lucent",
"version": "6.6.4.r01"
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 1.4,
"vendor": "alcatel lucent",
"version": "6.6.5.r02"
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 1.4,
"vendor": "alcatel lucent",
"version": "7.3.2.r01"
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 1.4,
"vendor": "alcatel lucent",
"version": "7.3.3.r01"
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 1.4,
"vendor": "alcatel lucent",
"version": "7.3.4.r01"
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 1.4,
"vendor": "alcatel lucent",
"version": "8.1.1.r01"
},
{
"model": "omniswitch",
"scope": "lte",
"trust": 1.0,
"vendor": "alcatel lucent",
"version": "6.6.4.r01"
},
{
"model": "omniswitch",
"scope": "lte",
"trust": 1.0,
"vendor": "alcatel lucent",
"version": "8.1.1.r01"
},
{
"model": "omniswitch",
"scope": "lte",
"trust": 1.0,
"vendor": "alcatel lucent",
"version": "7.3.2.r01"
},
{
"model": "omniswitch",
"scope": "lte",
"trust": 1.0,
"vendor": "alcatel lucent",
"version": "6.6.5.r02"
},
{
"model": "omniswitch",
"scope": "lte",
"trust": 1.0,
"vendor": "alcatel lucent",
"version": "7.3.4.r01"
},
{
"model": "omniswitch",
"scope": "lte",
"trust": 1.0,
"vendor": "alcatel lucent",
"version": "6.4.5.r02"
},
{
"model": "omniswitch",
"scope": "lte",
"trust": 1.0,
"vendor": "alcatel lucent",
"version": "6.4.6.r01"
},
{
"model": "omniswitch",
"scope": "lte",
"trust": 1.0,
"vendor": "alcatel lucent",
"version": "7.3.3.r01"
},
{
"model": "omniswitch 10k",
"scope": null,
"trust": 0.8,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 6250",
"scope": null,
"trust": 0.8,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 6400",
"scope": null,
"trust": 0.8,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 6450",
"scope": null,
"trust": 0.8,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 6850e",
"scope": null,
"trust": 0.8,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 6855",
"scope": null,
"trust": 0.8,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 6860",
"scope": null,
"trust": 0.8,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 6900",
"scope": null,
"trust": 0.8,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 9000e",
"scope": null,
"trust": 0.8,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 0.6,
"vendor": "alcatel",
"version": "6860"
},
{
"model": "omniswitch 10k",
"scope": null,
"trust": 0.6,
"vendor": "alcatel",
"version": null
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 0.6,
"vendor": "alcatel",
"version": "6900"
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 0.6,
"vendor": "alcatel",
"version": "6855"
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 0.6,
"vendor": "alcatel",
"version": "6400"
},
{
"model": "omniswitch 9000e",
"scope": null,
"trust": 0.6,
"vendor": "alcatel",
"version": null
},
{
"model": "omniswitch 6850e",
"scope": null,
"trust": 0.6,
"vendor": "alcatel",
"version": null
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 0.6,
"vendor": "alcatel",
"version": "6250"
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 0.6,
"vendor": "alcatel",
"version": "6450"
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 0.6,
"vendor": "alcatel",
"version": "7700"
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 0.6,
"vendor": "alcatel",
"version": "7800"
},
{
"model": "omniswitch 9000e 8.1.1.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 9000e 7.3.4.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 9000e 7.3.3.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 9000e 7.3.2.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 9000e 6.6.5.r02",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 9000e 6.6.4.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 9000e 6.4.6.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 9000e 6.4.5.r02",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 8.1.1.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6900"
},
{
"model": "omniswitch 7.3.4.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6900"
},
{
"model": "omniswitch 7.3.3.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6900"
},
{
"model": "omniswitch 7.3.2.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6900"
},
{
"model": "omniswitch 6.6.5.r02",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6900"
},
{
"model": "omniswitch 6.6.4.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6900"
},
{
"model": "omniswitch 6.4.6.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6900"
},
{
"model": "omniswitch 6.4.5.r02",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6900"
},
{
"model": "omniswitch 8.1.1.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6860"
},
{
"model": "omniswitch 7.3.4.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6860"
},
{
"model": "omniswitch 7.3.3.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6860"
},
{
"model": "omniswitch 7.3.2.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6860"
},
{
"model": "omniswitch 6.6.5.r02",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6860"
},
{
"model": "omniswitch 6.6.4.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6860"
},
{
"model": "omniswitch 6.4.6.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6860"
},
{
"model": "omniswitch 6.4.5.r02",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6860"
},
{
"model": "omniswitch 8.1.1.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6855"
},
{
"model": "omniswitch 7.3.4.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6855"
},
{
"model": "omniswitch 7.3.3.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6855"
},
{
"model": "omniswitch 7.3.2.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6855"
},
{
"model": "omniswitch 6.6.5.r02",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6855"
},
{
"model": "omniswitch 6.6.4.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6855"
},
{
"model": "omniswitch 6.4.6.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6855"
},
{
"model": "omniswitch 6.4.5.r02",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6855"
},
{
"model": "omniswitch 6850e 8.1.1.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 6850e 7.3.4.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 6850e 7.3.3.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 6850e 7.3.2.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 6850e 6.6.5.r02",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 6850e 6.6.4.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 6850e 6.4.6.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 6850e 6.4.5.r02",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 8.1.1.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6450"
},
{
"model": "omniswitch 7.3.4.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6450"
},
{
"model": "omniswitch 7.3.3.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6450"
},
{
"model": "omniswitch 7.3.2.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6450"
},
{
"model": "omniswitch 6.6.5.r02",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6450"
},
{
"model": "omniswitch 6.6.4.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6450"
},
{
"model": "omniswitch 6.4.6.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6450"
},
{
"model": "omniswitch 6.4.5.r02",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6450"
},
{
"model": "omniswitch 8.1.1.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6400"
},
{
"model": "omniswitch 7.3.4.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6400"
},
{
"model": "omniswitch 7.3.3.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6400"
},
{
"model": "omniswitch 7.3.2.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6400"
},
{
"model": "omniswitch 6.6.5.r02",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6400"
},
{
"model": "omniswitch 6.6.4.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6400"
},
{
"model": "omniswitch 6.4.6.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6400"
},
{
"model": "omniswitch 6.4.5.r02",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6400"
},
{
"model": "omniswitch 8.1.1.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6250"
},
{
"model": "omniswitch 7.3.4.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6250"
},
{
"model": "omniswitch 7.3.3.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6250"
},
{
"model": "omniswitch 7.3.2.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6250"
},
{
"model": "omniswitch 6.6.5.r02",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6250"
},
{
"model": "omniswitch 6.6.4.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6250"
},
{
"model": "omniswitch 6.4.6.r01",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6250"
},
{
"model": "omniswitch 6.4.5.r02",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "6250"
},
{
"model": "omniswitch 10k 8.1.1.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 10k 7.3.4.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 10k 7.3.3.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 10k 7.3.2.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 10k 6.6.5.r02",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 10k 6.6.4.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 10k 6.4.6.r01",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
},
{
"model": "omniswitch 10k 6.4.5.r02",
"scope": null,
"trust": 0.3,
"vendor": "alcatel lucent",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03785"
},
{
"db": "BID",
"id": "75121"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003165"
},
{
"db": "NVD",
"id": "CVE-2015-2805"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-297"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.4.5.r02",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.1.1.r01",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.6.5.r02",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.3.2.r01",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.4.6.r01",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.6.4.r01",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.3.3.r01",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.3.4.r01",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:alcatel-lucent:omniswitch_6450:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:alcatel-lucent:omniswitch_10k:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:alcatel-lucent:omniswitch_6860:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:alcatel-lucent:omniswitch_9000e:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:alcatel-lucent:omniswitch_6900:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:alcatel-lucent:omniswitch_6855:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:alcatel-lucent:omniswitch_6400:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:alcatel-lucent:omniswitch_6850e:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:alcatel-lucent:omniswitch_6250:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-2805"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "RedTeam Pentesting GmbH",
"sources": [
{
"db": "BID",
"id": "75121"
}
],
"trust": 0.3
},
"cve": "CVE-2015-2805",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2015-2805",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 6.8,
"id": "CNVD-2015-03785",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-80766",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-2805",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2015-03785",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-201506-297",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-80766",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03785"
},
{
"db": "VULHUB",
"id": "VHN-80766"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003165"
},
{
"db": "NVD",
"id": "CVE-2015-2805"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-297"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cross-site request forgery (CSRF) vulnerability in sec/content/sec_asa_users_local_db_add.html in the management web interface in Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, 6855, 6900, 10K, and 6860 with firmware 6.4.5.R02, 6.4.6.R01, 6.6.4.R01, 6.6.5.R02, 7.3.2.R01, 7.3.3.R01, 7.3.4.R01, and 8.1.1.R01 allows remote attackers to hijack the authentication of administrators for requests that create users via a crafted request. Alcatel OmniSwitch is an enterprise-class switch. Multiple Alcatel-Lucent OmniSwitch products are prone to a cross-site request-forgery vulnerability. \nAn attacker can exploit this issue to perform unauthorized actions in the context of a logged-in user of the affected application. This may aid in other attacks. Alcatel-Lucent OmniSwitch 6450, etc. are switches products of Alcatel-Lucent (Alcatel-Lucent) in France. The following products and versions are affected: using version 6.4.5.R02, version 6.4.6.R01, version 6.6.4.R01, version 6.6.5.R02, version 7.3.2.R01, version 7.3.3.R01, Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, 6855, 6900, 10K, 6860 with firmware 7.3.4.R01 and 8.1.1.R01",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-2805"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003165"
},
{
"db": "CNVD",
"id": "CNVD-2015-03785"
},
{
"db": "BID",
"id": "75121"
},
{
"db": "VULHUB",
"id": "VHN-80766"
}
],
"trust": 2.52
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-80766",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80766"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-2805",
"trust": 3.4
},
{
"db": "BID",
"id": "75121",
"trust": 2.0
},
{
"db": "PACKETSTORM",
"id": "132236",
"trust": 1.7
},
{
"db": "EXPLOIT-DB",
"id": "37261",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1032544",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003165",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201506-297",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-03785",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-80766",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03785"
},
{
"db": "VULHUB",
"id": "VHN-80766"
},
{
"db": "BID",
"id": "75121"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003165"
},
{
"db": "NVD",
"id": "CVE-2015-2805"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-297"
}
]
},
"id": "VAR-201506-0116",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03785"
},
{
"db": "VULHUB",
"id": "VHN-80766"
}
],
"trust": 1.322222233333333
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03785"
}
]
},
"last_update_date": "2023-12-18T13:57:36.310000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.alcatel-lucent.com/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-003165"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-352",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80766"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003165"
},
{
"db": "NVD",
"id": "CVE-2015-2805"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "https://www.redteam-pentesting.de/advisories/rt-sa-2015-004"
},
{
"trust": 1.7,
"url": "https://www.exploit-db.com/exploits/37261/"
},
{
"trust": 1.7,
"url": "http://seclists.org/fulldisclosure/2015/jun/23"
},
{
"trust": 1.7,
"url": "http://packetstormsecurity.com/files/132236/alcatel-lucent-omniswitch-web-interface-cross-site-request-forgery.html"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1032544"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/75121"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/535732/100/0/threaded"
},
{
"trust": 1.1,
"url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2015-004/-alcatel-lucent-omniswitch-web-interface-cross-site-request-forgery"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2805"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-2805"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/535732/100/0/threaded"
},
{
"trust": 0.3,
"url": "http://enterprise.alcatel-lucent.com/?product=omniswitch6450\u0026page=overview"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03785"
},
{
"db": "VULHUB",
"id": "VHN-80766"
},
{
"db": "BID",
"id": "75121"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003165"
},
{
"db": "NVD",
"id": "CVE-2015-2805"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-297"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-03785"
},
{
"db": "VULHUB",
"id": "VHN-80766"
},
{
"db": "BID",
"id": "75121"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003165"
},
{
"db": "NVD",
"id": "CVE-2015-2805"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-297"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-06-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-03785"
},
{
"date": "2015-06-16T00:00:00",
"db": "VULHUB",
"id": "VHN-80766"
},
{
"date": "2015-06-10T00:00:00",
"db": "BID",
"id": "75121"
},
{
"date": "2015-06-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-003165"
},
{
"date": "2015-06-16T16:59:01.113000",
"db": "NVD",
"id": "CVE-2015-2805"
},
{
"date": "2015-06-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201506-297"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-06-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-03785"
},
{
"date": "2018-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-80766"
},
{
"date": "2015-06-10T00:00:00",
"db": "BID",
"id": "75121"
},
{
"date": "2015-06-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-003165"
},
{
"date": "2018-10-09T19:56:24.607000",
"db": "NVD",
"id": "CVE-2015-2805"
},
{
"date": "2015-06-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201506-297"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201506-297"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Alcatel-Lucent OmniSwitch Firmware management Web Cross-site request forgery vulnerability in the interface",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-003165"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "cross-site request forgery",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201506-297"
}
],
"trust": 0.6
}
}
VAR-199903-0049
Vulnerability from variot - Updated: 2023-12-18 13:21Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time. Omniswitch is prone to a security bypass vulnerability. Xylan OmniSwitch prior to 3.2.6 is vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-199903-0049",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "omniswitch",
"scope": "lte",
"trust": 1.0,
"vendor": "alcatel",
"version": "3.2.4"
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 0.9,
"vendor": "alcatel",
"version": "3.2.4"
}
],
"sources": [
{
"db": "BID",
"id": "87962"
},
{
"db": "NVD",
"id": "CVE-1999-1559"
},
{
"db": "CNNVD",
"id": "CNNVD-199903-052"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:alcatel:omniswitch:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.2.4",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-1999-1559"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "87962"
}
],
"trust": 0.3
},
"cve": "CVE-1999-1559",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-1540",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-1999-1559",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-199903-052",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-1540",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-1540"
},
{
"db": "NVD",
"id": "CVE-1999-1559"
},
{
"db": "CNNVD",
"id": "CNNVD-199903-052"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time. Omniswitch is prone to a security bypass vulnerability. Xylan OmniSwitch prior to 3.2.6 is vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-1999-1559"
},
{
"db": "BID",
"id": "87962"
},
{
"db": "VULHUB",
"id": "VHN-1540"
}
],
"trust": 1.26
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-1999-1559",
"trust": 2.0
},
{
"db": "XF",
"id": "2064",
"trust": 0.9
},
{
"db": "CNNVD",
"id": "CNNVD-199903-052",
"trust": 0.7
},
{
"db": "BUGTRAQ",
"id": "19990331 XYLAN OMNISWITCH \"FEATURES\"",
"trust": 0.6
},
{
"db": "BID",
"id": "87962",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-1540",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-1540"
},
{
"db": "BID",
"id": "87962"
},
{
"db": "NVD",
"id": "CVE-1999-1559"
},
{
"db": "CNNVD",
"id": "CNNVD-199903-052"
}
]
},
"id": "VAR-199903-0049",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-1540"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:21:28.849000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-1999-1559"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
},
{
"trust": 0.9,
"url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=92299263017061\u0026w=2"
},
{
"trust": 0.9,
"url": "http://xforce.iss.net/static/2064.php"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=92299263017061\u0026amp;w=2"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-1540"
},
{
"db": "BID",
"id": "87962"
},
{
"db": "NVD",
"id": "CVE-1999-1559"
},
{
"db": "CNNVD",
"id": "CNNVD-199903-052"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-1540"
},
{
"db": "BID",
"id": "87962"
},
{
"db": "NVD",
"id": "CVE-1999-1559"
},
{
"db": "CNNVD",
"id": "CNNVD-199903-052"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "1999-03-31T00:00:00",
"db": "VULHUB",
"id": "VHN-1540"
},
{
"date": "1999-03-31T00:00:00",
"db": "BID",
"id": "87962"
},
{
"date": "1999-03-31T05:00:00",
"db": "NVD",
"id": "CVE-1999-1559"
},
{
"date": "1999-03-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-199903-052"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-19T00:00:00",
"db": "VULHUB",
"id": "VHN-1540"
},
{
"date": "1999-03-31T00:00:00",
"db": "BID",
"id": "87962"
},
{
"date": "2017-12-19T02:29:10.580000",
"db": "NVD",
"id": "CVE-1999-1559"
},
{
"date": "2006-09-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-199903-052"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-199903-052"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Xylan OmniSwitch Input validation vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-199903-052"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "unknown",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-199903-052"
}
],
"trust": 0.6
}
}
VAR-200412-0377
Vulnerability from variot - Updated: 2023-12-18 12:59Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled. Alcatel Omniswitch is a high-performance switch.
The OmniSwitch 7000 series switch system has problems processing some types of network communications. Remote attackers can use this vulnerability to conduct denial of service attacks on the switch.
When using Nessus for security scanning, it was found that the OmniSwitch 7000 series switches would be restarted, causing a denial of service. The problem is in the handling of scans by third-party security software. It has been reported that as a result of such scans, the switch reportedly reboots, impacting performance
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200412-0377",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "omniswitch",
"scope": "eq",
"trust": 1.6,
"vendor": "alcatel",
"version": "7000"
},
{
"model": "omniswitch 7800",
"scope": "eq",
"trust": 1.0,
"vendor": "alcatel",
"version": "*"
},
{
"model": null,
"scope": null,
"trust": 0.6,
"vendor": "none",
"version": null
},
{
"model": "omniswitch 7800",
"scope": null,
"trust": 0.6,
"vendor": "alcatel",
"version": null
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "78000"
},
{
"model": "omniswitch",
"scope": "eq",
"trust": 0.3,
"vendor": "alcatel lucent",
"version": "77000"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2004-0571"
},
{
"db": "BID",
"id": "9745"
},
{
"db": "NVD",
"id": "CVE-2004-2377"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-127"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:alcatel:omniswitch_7800:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:alcatel:omniswitch:7000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2004-2377"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Michael Shekman\u203b michaels80@ci.manchester.ct.us",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200412-127"
}
],
"trust": 0.6
},
"cve": "CVE-2004-2377",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-10805",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2004-2377",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200412-127",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-10805",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-10805"
},
{
"db": "NVD",
"id": "CVE-2004-2377"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-127"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled. Alcatel Omniswitch is a high-performance switch. \n\n\u00a0The OmniSwitch 7000 series switch system has problems processing some types of network communications. Remote attackers can use this vulnerability to conduct denial of service attacks on the switch. \n\n\u00a0When using Nessus for security scanning, it was found that the OmniSwitch 7000 series switches would be restarted, causing a denial of service. \nThe problem is in the handling of scans by third-party security software. It has been reported that as a result of such scans, the switch reportedly reboots, impacting performance",
"sources": [
{
"db": "NVD",
"id": "CVE-2004-2377"
},
{
"db": "CNVD",
"id": "CNVD-2004-0571"
},
{
"db": "BID",
"id": "9745"
},
{
"db": "VULHUB",
"id": "VHN-10805"
}
],
"trust": 1.8
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2004-2377",
"trust": 2.3
},
{
"db": "BID",
"id": "9745",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "10981",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1009211",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "4064",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-200412-127",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2004-0571",
"trust": 0.6
},
{
"db": "XF",
"id": "15318",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "6098",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20040219 ALCATEL OMNISWITCH 7000 SERIES",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-10805",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2004-0571"
},
{
"db": "VULHUB",
"id": "VHN-10805"
},
{
"db": "BID",
"id": "9745"
},
{
"db": "NVD",
"id": "CVE-2004-2377"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-127"
}
]
},
"id": "VAR-200412-0377",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-10805"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:59:36.234000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2004-2377"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/9745"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/archive/1/355134"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/4064"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1009211"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/10981"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/15318"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/6098"
},
{
"trust": 0.3,
"url": "http://www.ind.alcatel.com/products/index.cfm?cnt=omniswitch_7000"
},
{
"trust": 0.3,
"url": "/archive/1/355134"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-10805"
},
{
"db": "BID",
"id": "9745"
},
{
"db": "NVD",
"id": "CVE-2004-2377"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-127"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2004-0571"
},
{
"db": "VULHUB",
"id": "VHN-10805"
},
{
"db": "BID",
"id": "9745"
},
{
"db": "NVD",
"id": "CVE-2004-2377"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-127"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-02-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2004-0571"
},
{
"date": "2004-12-31T00:00:00",
"db": "VULHUB",
"id": "VHN-10805"
},
{
"date": "2004-02-25T00:00:00",
"db": "BID",
"id": "9745"
},
{
"date": "2004-12-31T05:00:00",
"db": "NVD",
"id": "CVE-2004-2377"
},
{
"date": "2004-02-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200412-127"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-02-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2004-0571"
},
{
"date": "2017-07-11T00:00:00",
"db": "VULHUB",
"id": "VHN-10805"
},
{
"date": "2004-02-25T00:00:00",
"db": "BID",
"id": "9745"
},
{
"date": "2017-07-11T01:31:50.670000",
"db": "NVD",
"id": "CVE-2004-2377"
},
{
"date": "2005-10-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200412-127"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200412-127"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Alcatel OmniSwitch 7000 Series Security Scan Denial of Service Attack Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2004-0571"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-127"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200412-127"
}
],
"trust": 0.6
}
}
CVE-2004-2377 (GCVE-0-2004-2377)
Vulnerability from cvelistv5 – Published: 2005-08-16 04:00 – Updated: 2024-08-08 01:22- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:22:13.755Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "alcatel-omniswitch-nessus-dos(15318)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
},
{
"name": "9745",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/9745"
},
{
"name": "10981",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/10981"
},
{
"name": "4064",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/4064"
},
{
"name": "20040219 Alcatel Omniswitch 7000 series",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/355134"
},
{
"name": "1009211",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1009211"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-02-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "alcatel-omniswitch-nessus-dos(15318)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
},
{
"name": "9745",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/9745"
},
{
"name": "10981",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/10981"
},
{
"name": "4064",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/4064"
},
{
"name": "20040219 Alcatel Omniswitch 7000 series",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/355134"
},
{
"name": "1009211",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1009211"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-2377",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "alcatel-omniswitch-nessus-dos(15318)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
},
{
"name": "9745",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9745"
},
{
"name": "10981",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/10981"
},
{
"name": "4064",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4064"
},
{
"name": "20040219 Alcatel Omniswitch 7000 series",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/355134"
},
{
"name": "1009211",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1009211"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-2377",
"datePublished": "2005-08-16T04:00:00",
"dateReserved": "2005-08-16T00:00:00",
"dateUpdated": "2024-08-08T01:22:13.755Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-1999-1559 (GCVE-0-1999-1559)
Vulnerability from cvelistv5 – Published: 2001-09-12 04:00 – Updated: 2024-08-01 17:18- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T17:18:07.559Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "xylan-omniswitch-login(2064)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
},
{
"name": "19990331 Xylan OmniSwitch \"features\"",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "1999-03-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-12-18T21:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "xylan-omniswitch-login(2064)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
},
{
"name": "19990331 Xylan OmniSwitch \"features\"",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-1999-1559",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "xylan-omniswitch-login(2064)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
},
{
"name": "19990331 Xylan OmniSwitch \"features\"",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-1999-1559",
"datePublished": "2001-09-12T04:00:00",
"dateReserved": "2001-08-31T00:00:00",
"dateUpdated": "2024-08-01T17:18:07.559Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-2377 (GCVE-0-2004-2377)
Vulnerability from nvd – Published: 2005-08-16 04:00 – Updated: 2024-08-08 01:22- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:22:13.755Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "alcatel-omniswitch-nessus-dos(15318)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
},
{
"name": "9745",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/9745"
},
{
"name": "10981",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/10981"
},
{
"name": "4064",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/4064"
},
{
"name": "20040219 Alcatel Omniswitch 7000 series",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/355134"
},
{
"name": "1009211",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1009211"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-02-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "alcatel-omniswitch-nessus-dos(15318)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
},
{
"name": "9745",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/9745"
},
{
"name": "10981",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/10981"
},
{
"name": "4064",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/4064"
},
{
"name": "20040219 Alcatel Omniswitch 7000 series",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/355134"
},
{
"name": "1009211",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1009211"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-2377",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "alcatel-omniswitch-nessus-dos(15318)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
},
{
"name": "9745",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9745"
},
{
"name": "10981",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/10981"
},
{
"name": "4064",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4064"
},
{
"name": "20040219 Alcatel Omniswitch 7000 series",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/355134"
},
{
"name": "1009211",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1009211"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-2377",
"datePublished": "2005-08-16T04:00:00",
"dateReserved": "2005-08-16T00:00:00",
"dateUpdated": "2024-08-08T01:22:13.755Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-1999-1559 (GCVE-0-1999-1559)
Vulnerability from nvd – Published: 2001-09-12 04:00 – Updated: 2024-08-01 17:18- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T17:18:07.559Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "xylan-omniswitch-login(2064)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
},
{
"name": "19990331 Xylan OmniSwitch \"features\"",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "1999-03-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-12-18T21:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "xylan-omniswitch-login(2064)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
},
{
"name": "19990331 Xylan OmniSwitch \"features\"",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-1999-1559",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "xylan-omniswitch-login(2064)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
},
{
"name": "19990331 Xylan OmniSwitch \"features\"",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-1999-1559",
"datePublished": "2001-09-12T04:00:00",
"dateReserved": "2001-08-31T00:00:00",
"dateUpdated": "2024-08-01T17:18:07.559Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2004-2377
Vulnerability from fkie_nvd - Published: 2004-12-31 05:00 - Updated: 2025-04-03 01:03| Vendor | Product | Version | |
|---|---|---|---|
| alcatel | omniswitch | 7000 | |
| alcatel | omniswitch_7800 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:alcatel:omniswitch:7000:*:*:*:*:*:*:*",
"matchCriteriaId": "A2B5A849-F52B-459F-AD21-4EAAE561D1DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:alcatel:omniswitch_7800:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E36E6C20-6CC7-45EA-9A3F-67D85E01D604",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled."
}
],
"id": "CVE-2004-2377",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/10981"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1009211"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/4064"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/355134"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/9745"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/10981"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1009211"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/4064"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/355134"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/9745"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-1999-1559
Vulnerability from fkie_nvd - Published: 1999-03-31 05:00 - Updated: 2025-04-03 01:03| Vendor | Product | Version | |
|---|---|---|---|
| alcatel | omniswitch | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:alcatel:omniswitch:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E4EF8121-C699-4F9C-A320-C13C444B2730",
"versionEndIncluding": "3.2.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time."
}
],
"id": "CVE-1999-1559",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "1999-03-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}