All the vulnerabilites related to cisco - optical_networking_systems_software
cve-2002-0952
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 03:12
Severity ?
EPSS score ?
Summary
Cisco ONS15454 optical transport platform running ONS 3.1.0 to 3.2.0 allows remote attackers to cause a denial of service (reset) by sending IP packets with non-zero Type of Service (TOS) bits to the Timing Control Card (TCC) LAN interface.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/5058 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/warp/public/707/ons-tos-vuln-pub.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.iss.net/security_center/static/9377.php | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:12:16.689Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "5058", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5058" }, { "name": "20020619 Cisco ONS15454 IP TOS Bit Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/ons-tos-vuln-pub.shtml" }, { "name": "cisco-ons-tcc-dos(9377)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/9377.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-06-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco ONS15454 optical transport platform running ONS 3.1.0 to 3.2.0 allows remote attackers to cause a denial of service (reset) by sending IP packets with non-zero Type of Service (TOS) bits to the Timing Control Card (TCC) LAN interface." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-09-10T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "5058", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5058" }, { "name": "20020619 Cisco ONS15454 IP TOS Bit Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/ons-tos-vuln-pub.shtml" }, { "name": "cisco-ons-tcc-dos(9377)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/9377.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0952", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco ONS15454 optical transport platform running ONS 3.1.0 to 3.2.0 allows remote attackers to cause a denial of service (reset) by sending IP packets with non-zero Type of Service (TOS) bits to the Timing Control Card (TCC) LAN interface." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "5058", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5058" }, { "name": "20020619 Cisco ONS15454 IP TOS Bit Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/ons-tos-vuln-pub.shtml" }, { "name": "cisco-ons-tcc-dos(9377)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/9377.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0952", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-08-16T00:00:00", "dateUpdated": "2024-08-08T03:12:16.689Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-1672
Vulnerability from cvelistv5
Published
2006-04-07 10:00
Modified
2024-08-07 17:19
Severity ?
EPSS score ?
Summary
The installation of Cisco Transport Controller (CTC) for Cisco Optical Networking System (ONS) 15000 series nodes adds a Java policy file entry with a wildcard that grants the java.security.AllPermission permission to any http URL containing "fs/LAUNCHER.jar", which allows remote attackers to execute arbitrary code on a CTC workstation, aka bug ID CSCea25049.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2006/1256 | vdb-entry, x_refsource_VUPEN | |
http://www.osvdb.org/24438 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/19553 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25647 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/17384 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1015871 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:19:49.267Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-1256", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "name": "24438", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/24438" }, { "name": "19553", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19553" }, { "name": "cisco-ons-ctc-code-execution(25647)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25647" }, { "name": "17384", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17384" }, { "name": "1015871", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015871" }, { "name": "20060405 Cisco Optical Networking System 15000 Series and Cisco Transport Controller Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The installation of Cisco Transport Controller (CTC) for Cisco Optical Networking System (ONS) 15000 series nodes adds a Java policy file entry with a wildcard that grants the java.security.AllPermission permission to any http URL containing \"fs/LAUNCHER.jar\", which allows remote attackers to execute arbitrary code on a CTC workstation, aka bug ID CSCea25049." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2006-1256", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "name": "24438", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/24438" }, { "name": "19553", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19553" }, { "name": "cisco-ons-ctc-code-execution(25647)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25647" }, { "name": "17384", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17384" }, { "name": "1015871", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015871" }, { "name": "20060405 Cisco Optical Networking System 15000 Series and Cisco Transport Controller Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1672", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The installation of Cisco Transport Controller (CTC) for Cisco Optical Networking System (ONS) 15000 series nodes adds a Java policy file entry with a wildcard that grants the java.security.AllPermission permission to any http URL containing \"fs/LAUNCHER.jar\", which allows remote attackers to execute arbitrary code on a CTC workstation, aka bug ID CSCea25049." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2006-1256", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "name": "24438", "refsource": "OSVDB", "url": "http://www.osvdb.org/24438" }, { "name": "19553", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19553" }, { "name": "cisco-ons-ctc-code-execution(25647)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25647" }, { "name": "17384", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17384" }, { "name": "1015871", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015871" }, { "name": "20060405 Cisco Optical Networking System 15000 Series and Cisco Transport Controller Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1672", "datePublished": "2006-04-07T10:00:00", "dateReserved": "2006-04-07T00:00:00", "dateUpdated": "2024-08-07T17:19:49.267Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1558
Vulnerability from cvelistv5
Published
2003-03-18 05:00
Modified
2024-08-08 03:26
Severity ?
EPSS score ?
Summary
Cisco ONS15454 and ONS15327 running ONS before 3.4 have an account for the VxWorks Operating System in the TCC, TCC+ and XTC that cannot be changed or disabled, which allows remote attackers to gain privileges by connecting to the account via Telnet.
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/10510.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/6083 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:26:28.944Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-ons-default-vsworks-account(10510)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10510.php" }, { "name": "6083", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6083" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 have an account for the VxWorks Operating System in the TCC, TCC+ and XTC that cannot be changed or disabled, which allows remote attackers to gain privileges by connecting to the account via Telnet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "cisco-ons-default-vsworks-account(10510)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10510.php" }, { "name": "6083", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6083" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1558", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 have an account for the VxWorks Operating System in the TCC, TCC+ and XTC that cannot be changed or disabled, which allows remote attackers to gain privileges by connecting to the account via Telnet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-ons-default-vsworks-account(10510)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10510.php" }, { "name": "6083", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6083" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1558", "datePublished": "2003-03-18T05:00:00", "dateReserved": "2003-03-04T00:00:00", "dateUpdated": "2024-08-08T03:26:28.944Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-1434
Vulnerability from cvelistv5
Published
2005-02-13 05:00
Modified
2024-08-08 00:53
Severity ?
EPSS score ?
Summary
Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.1(0) to 4.1(2), 4.5(x), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed SNMP packets.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.kb.cert.org/vuls/id/548968 | third-party-advisory, x_refsource_CERT-VN | |
http://secunia.com/advisories/12117 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/10768 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16765 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:53:23.873Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "VU#548968", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/548968" }, { "name": "12117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10768" }, { "name": "cisco-ons-snmp-dos(16765)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16765" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-07-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.1(0) to 4.1(2), 4.5(x), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed SNMP packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "VU#548968", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/548968" }, { "name": "12117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10768" }, { "name": "cisco-ons-snmp-dos(16765)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16765" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1434", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.1(0) to 4.1(2), 4.5(x), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed SNMP packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "VU#548968", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/548968" }, { "name": "12117", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10768" }, { "name": "cisco-ons-snmp-dos(16765)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16765" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1434", "datePublished": "2005-02-13T05:00:00", "dateReserved": "2005-02-13T00:00:00", "dateUpdated": "2024-08-08T00:53:23.873Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1554
Vulnerability from cvelistv5
Published
2003-03-18 05:00
Modified
2024-08-08 03:26
Severity ?
EPSS score ?
Summary
Cisco ONS15454 and ONS15327 running ONS before 3.4 stores usernames and passwords in cleartext in the image database for the TCC, TCC+ or XTC, which could allow attackers to gain privileges by obtaining the passwords from the image database or a backup.
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/10506.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/6078 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:26:28.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-ons-plaintext-accounts(10506)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10506.php" }, { "name": "6078", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6078" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 stores usernames and passwords in cleartext in the image database for the TCC, TCC+ or XTC, which could allow attackers to gain privileges by obtaining the passwords from the image database or a backup." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "cisco-ons-plaintext-accounts(10506)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10506.php" }, { "name": "6078", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6078" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1554", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 stores usernames and passwords in cleartext in the image database for the TCC, TCC+ or XTC, which could allow attackers to gain privileges by obtaining the passwords from the image database or a backup." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-ons-plaintext-accounts(10506)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10506.php" }, { "name": "6078", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6078" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1554", "datePublished": "2003-03-18T05:00:00", "dateReserved": "2003-03-04T00:00:00", "dateUpdated": "2024-08-08T03:26:28.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1557
Vulnerability from cvelistv5
Published
2003-03-18 05:00
Modified
2024-08-08 03:26
Severity ?
EPSS score ?
Summary
Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset to TCC, TCC+, TCCi or XTC) via a malformed HTTP request that does not contain a leading / (slash) character.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/6082 | vdb-entry, x_refsource_BID | |
http://www.iss.net/security_center/static/10509.php | vdb-entry, x_refsource_XF | |
http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:26:28.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "6082", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6082" }, { "name": "cisco-ons-http-dos(10509)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10509.php" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset to TCC, TCC+, TCCi or XTC) via a malformed HTTP request that does not contain a leading / (slash) character." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "6082", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6082" }, { "name": "cisco-ons-http-dos(10509)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10509.php" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1557", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset to TCC, TCC+, TCCi or XTC) via a malformed HTTP request that does not contain a leading / (slash) character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "6082", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6082" }, { "name": "cisco-ons-http-dos(10509)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10509.php" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1557", "datePublished": "2003-03-18T05:00:00", "dateReserved": "2003-03-04T00:00:00", "dateUpdated": "2024-08-08T03:26:28.988Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1553
Vulnerability from cvelistv5
Published
2003-03-18 05:00
Modified
2024-08-08 03:26
Severity ?
EPSS score ?
Summary
Cisco ONS15454 and ONS15327 running ONS before 3.4 allows remote attackers to modify the system configuration and delete files by establishing an FTP connection to the TCC, TCC+ or XTC using a username and password that does not exist.
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/10505.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/6076 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:26:28.802Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-ons-ftp-no-account(10505)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10505.php" }, { "name": "6076", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6076" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 allows remote attackers to modify the system configuration and delete files by establishing an FTP connection to the TCC, TCC+ or XTC using a username and password that does not exist." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "cisco-ons-ftp-no-account(10505)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10505.php" }, { "name": "6076", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6076" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1553", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 allows remote attackers to modify the system configuration and delete files by establishing an FTP connection to the TCC, TCC+ or XTC using a username and password that does not exist." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-ons-ftp-no-account(10505)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10505.php" }, { "name": "6076", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6076" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1553", "datePublished": "2003-03-18T05:00:00", "dateReserved": "2003-03-04T00:00:00", "dateUpdated": "2024-08-08T03:26:28.802Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0714
Vulnerability from cvelistv5
Published
2004-07-21 04:00
Modified
2024-08-08 00:24
Severity ?
EPSS score ?
Summary
Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption).
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/15921 | vdb-entry, x_refsource_XF | |
http://www.kb.cert.org/vuls/id/162451 | third-party-advisory, x_refsource_CERT-VN | |
http://www.us-cert.gov/cas/techalerts/TA04-111B.html | third-party-advisory, x_refsource_CERT | |
http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/10186 | vdb-entry, x_refsource_BID | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5845 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:24:27.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-ios-snmp-udp-dos(15921)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15921" }, { "name": "VU#162451", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/162451" }, { "name": "TA04-111B", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA04-111B.html" }, { "name": "20040420 Vulnerabilities in SNMP Message Processing", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml" }, { "name": "10186", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10186" }, { "name": "oval:org.mitre.oval:def:5845", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5845" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-04-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "cisco-ios-snmp-udp-dos(15921)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15921" }, { "name": "VU#162451", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/162451" }, { "name": "TA04-111B", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA04-111B.html" }, { "name": "20040420 Vulnerabilities in SNMP Message Processing", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml" }, { "name": "10186", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10186" }, { "name": "oval:org.mitre.oval:def:5845", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5845" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0714", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-ios-snmp-udp-dos(15921)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15921" }, { "name": "VU#162451", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/162451" }, { "name": "TA04-111B", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA04-111B.html" }, { "name": "20040420 Vulnerabilities in SNMP Message Processing", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml" }, { "name": "10186", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10186" }, { "name": "oval:org.mitre.oval:def:5845", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5845" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0714", "datePublished": "2004-07-21T04:00:00", "dateReserved": "2004-07-20T00:00:00", "dateUpdated": "2024-08-08T00:24:27.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-1433
Vulnerability from cvelistv5
Published
2005-02-13 05:00
Modified
2024-08-08 00:53
Severity ?
EPSS score ?
Summary
Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, and ONS 15600 1.x(x), allows remote attackers to cause a denial of service (control card reset) via malformed (1) TCP and (2) UDP packets.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/800384 | third-party-advisory, x_refsource_CERT-VN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16764 | vdb-entry, x_refsource_XF | |
http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml | vendor-advisory, x_refsource_CISCO | |
http://secunia.com/advisories/12117 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/10768 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16762 | vdb-entry, x_refsource_XF | |
http://www.kb.cert.org/vuls/id/486224 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:53:23.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#800384", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/800384" }, { "name": "cisco-ons-udp-dos(16764)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16764" }, { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "12117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10768" }, { "name": "cisco-ons-tcp-dos(16762)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16762" }, { "name": "VU#486224", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/486224" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-07-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, and ONS 15600 1.x(x), allows remote attackers to cause a denial of service (control card reset) via malformed (1) TCP and (2) UDP packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "VU#800384", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/800384" }, { "name": "cisco-ons-udp-dos(16764)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16764" }, { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "12117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10768" }, { "name": "cisco-ons-tcp-dos(16762)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16762" }, { "name": "VU#486224", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/486224" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1433", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, and ONS 15600 1.x(x), allows remote attackers to cause a denial of service (control card reset) via malformed (1) TCP and (2) UDP packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#800384", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/800384" }, { "name": "cisco-ons-udp-dos(16764)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16764" }, { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "12117", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10768" }, { "name": "cisco-ons-tcp-dos(16762)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16762" }, { "name": "VU#486224", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/486224" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1433", "datePublished": "2005-02-13T05:00:00", "dateReserved": "2005-02-13T00:00:00", "dateUpdated": "2024-08-08T00:53:23.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-1436
Vulnerability from cvelistv5
Published
2005-02-13 05:00
Modified
2024-08-08 00:53
Severity ?
EPSS score ?
Summary
The Transaction Language 1 (TL1) login interface in Cisco ONS 15327 4.6(0) and 4.6(1) and 15454 and 15454 SDH 4.6(0) and 4.6(1), when a user account is configured with a blank password, allows remote attackers to gain unauthorized access by logging in with a password larger than 10 characters.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml | vendor-advisory, x_refsource_CISCO | |
http://secunia.com/advisories/12117 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/10768 | vdb-entry, x_refsource_BID | |
http://www.kb.cert.org/vuls/id/760432 | third-party-advisory, x_refsource_CERT-VN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16766 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:53:24.061Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "12117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10768" }, { "name": "VU#760432", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/760432" }, { "name": "cisco-ons-tl1-auth-bypass(16766)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16766" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-07-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The Transaction Language 1 (TL1) login interface in Cisco ONS 15327 4.6(0) and 4.6(1) and 15454 and 15454 SDH 4.6(0) and 4.6(1), when a user account is configured with a blank password, allows remote attackers to gain unauthorized access by logging in with a password larger than 10 characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "12117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10768" }, { "name": "VU#760432", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/760432" }, { "name": "cisco-ons-tl1-auth-bypass(16766)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16766" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1436", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Transaction Language 1 (TL1) login interface in Cisco ONS 15327 4.6(0) and 4.6(1) and 15454 and 15454 SDH 4.6(0) and 4.6(1), when a user account is configured with a blank password, allows remote attackers to gain unauthorized access by logging in with a password larger than 10 characters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "12117", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10768" }, { "name": "VU#760432", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/760432" }, { "name": "cisco-ons-tl1-auth-bypass(16766)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16766" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1436", "datePublished": "2005-02-13T05:00:00", "dateReserved": "2005-02-13T00:00:00", "dateUpdated": "2024-08-08T00:53:24.061Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1555
Vulnerability from cvelistv5
Published
2003-03-18 05:00
Modified
2024-08-08 03:26
Severity ?
EPSS score ?
Summary
Cisco ONS15454 and ONS15327 running ONS before 3.4 uses a "public" SNMP community string that cannot be changed, which allows remote attackers to obtain sensitive information.
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/10507.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/6081 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:26:28.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-ons-snmp-public(10507)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10507.php" }, { "name": "6081", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6081" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 uses a \"public\" SNMP community string that cannot be changed, which allows remote attackers to obtain sensitive information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "cisco-ons-snmp-public(10507)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10507.php" }, { "name": "6081", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6081" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1555", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 uses a \"public\" SNMP community string that cannot be changed, which allows remote attackers to obtain sensitive information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-ons-snmp-public(10507)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10507.php" }, { "name": "6081", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6081" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1555", "datePublished": "2003-03-18T05:00:00", "dateReserved": "2003-03-04T00:00:00", "dateUpdated": "2024-08-08T03:26:28.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0306
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 00:17
Severity ?
EPSS score ?
Summary
Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS 15600 before 1.3(0) enable TFTP service on UDP port 69 by default, which allows remote attackers to GET or PUT ONS system files on the current active TCC in the /flash0 or /flash1 directories.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/9699 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15264 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:17:14.021Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040219 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "name": "9699", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9699" }, { "name": "cisco-ons-file-upload(15264)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15264" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS 15600 before 1.3(0) enable TFTP service on UDP port 69 by default, which allows remote attackers to GET or PUT ONS system files on the current active TCC in the /flash0 or /flash1 directories." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-03-23T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040219 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "name": "9699", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9699" }, { "name": "cisco-ons-file-upload(15264)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15264" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0306", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS 15600 before 1.3(0) enable TFTP service on UDP port 69 by default, which allows remote attackers to GET or PUT ONS system files on the current active TCC in the /flash0 or /flash1 directories." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040219 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "name": "9699", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9699" }, { "name": "cisco-ons-file-upload(15264)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15264" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0306", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2004-03-17T00:00:00", "dateUpdated": "2024-08-08T00:17:14.021Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0307
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 00:17
Severity ?
EPSS score ?
Summary
Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), and ONS 15454 SD before 4.1(3) allows remote attackers to cause a denial of service (reset) by not sending the ACK portion of the TCP three-way handshake and sending an invalid response instead.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/9699 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/4009 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15265 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:17:13.697Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040219 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "name": "9699", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9699" }, { "name": "4009", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/4009" }, { "name": "cisco-ons-ack-dos(15265)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15265" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), and ONS 15454 SD before 4.1(3) allows remote attackers to cause a denial of service (reset) by not sending the ACK portion of the TCP three-way handshake and sending an invalid response instead." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-08-20T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040219 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "name": "9699", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9699" }, { "name": "4009", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/4009" }, { "name": "cisco-ons-ack-dos(15265)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15265" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0307", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), and ONS 15454 SD before 4.1(3) allows remote attackers to cause a denial of service (reset) by not sending the ACK portion of the TCP three-way handshake and sending an invalid response instead." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040219 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "name": "9699", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9699" }, { "name": "4009", "refsource": "OSVDB", "url": "http://www.osvdb.org/4009" }, { "name": "cisco-ons-ack-dos(15265)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15265" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0307", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2004-03-17T00:00:00", "dateUpdated": "2024-08-08T00:17:13.697Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1556
Vulnerability from cvelistv5
Published
2003-03-18 05:00
Modified
2024-08-08 03:26
Severity ?
EPSS score ?
Summary
Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset) via an HTTP request to the TCC, TCC+ or XTC, in which the request contains an invalid CORBA Interoperable Object Reference (IOR).
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/6084 | vdb-entry, x_refsource_BID | |
http://www.iss.net/security_center/static/10508.php | vdb-entry, x_refsource_XF | |
http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:26:28.800Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "6084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6084" }, { "name": "cisco-ons-corba-dos(10508)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10508.php" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset) via an HTTP request to the TCC, TCC+ or XTC, in which the request contains an invalid CORBA Interoperable Object Reference (IOR)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "6084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6084" }, { "name": "cisco-ons-corba-dos(10508)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10508.php" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1556", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset) via an HTTP request to the TCC, TCC+ or XTC, in which the request contains an invalid CORBA Interoperable Object Reference (IOR)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "6084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6084" }, { "name": "cisco-ons-corba-dos(10508)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10508.php" }, { "name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1556", "datePublished": "2003-03-18T05:00:00", "dateReserved": "2003-03-04T00:00:00", "dateUpdated": "2024-08-08T03:26:28.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-1432
Vulnerability from cvelistv5
Published
2005-02-13 05:00
Modified
2024-08-08 00:53
Severity ?
EPSS score ?
Summary
Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed (1) IP or (2) ICMP packets.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml | vendor-advisory, x_refsource_CISCO | |
http://secunia.com/advisories/12117 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/10768 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16760 | vdb-entry, x_refsource_XF | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16761 | vdb-entry, x_refsource_XF | |
http://www.kb.cert.org/vuls/id/918920 | third-party-advisory, x_refsource_CERT-VN | |
http://www.kb.cert.org/vuls/id/969344 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:53:23.665Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "12117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10768" }, { "name": "cisco-ons-ip-dos(16760)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16760" }, { "name": "cisco-ons-icmp-dos(16761)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16761" }, { "name": "VU#918920", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/918920" }, { "name": "VU#969344", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/969344" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-07-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed (1) IP or (2) ICMP packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "12117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10768" }, { "name": "cisco-ons-ip-dos(16760)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16760" }, { "name": "cisco-ons-icmp-dos(16761)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16761" }, { "name": "VU#918920", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/918920" }, { "name": "VU#969344", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/969344" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1432", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed (1) IP or (2) ICMP packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "12117", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10768" }, { "name": "cisco-ons-ip-dos(16760)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16760" }, { "name": "cisco-ons-icmp-dos(16761)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16761" }, { "name": "VU#918920", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/918920" }, { "name": "VU#969344", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/969344" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1432", "datePublished": "2005-02-13T05:00:00", "dateReserved": "2005-02-13T00:00:00", "dateUpdated": "2024-08-08T00:53:23.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-1670
Vulnerability from cvelistv5
Published
2006-04-07 10:00
Modified
2024-08-07 17:19
Severity ?
EPSS score ?
Summary
Control cards for Cisco Optical Networking System (ONS) 15000 series nodes before 20060405 allow remote attackers to cause a denial of service (memory exhaustion and possibly card reset) by sending an invalid response when the final ACK is expected, aka bug ID CSCei45910.
References
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/24434 | vdb-entry, x_refsource_OSVDB | |
http://securitytracker.com/id?1015872 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2006/1256 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/19553 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/17384 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25643 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:19:49.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "24434", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/24434" }, { "name": "1015872", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015872" }, { "name": "ADV-2006-1256", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "name": "19553", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19553" }, { "name": "17384", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17384" }, { "name": "20060405 Cisco Optical Networking System 15000 Series and Cisco Transport Controller Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" }, { "name": "cisco-ons-iplan-ack-dos(25643)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25643" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Control cards for Cisco Optical Networking System (ONS) 15000 series nodes before 20060405 allow remote attackers to cause a denial of service (memory exhaustion and possibly card reset) by sending an invalid response when the final ACK is expected, aka bug ID CSCei45910." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "24434", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/24434" }, { "name": "1015872", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015872" }, { "name": "ADV-2006-1256", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "name": "19553", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19553" }, { "name": "17384", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17384" }, { "name": "20060405 Cisco Optical Networking System 15000 Series and Cisco Transport Controller Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" }, { "name": "cisco-ons-iplan-ack-dos(25643)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25643" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1670", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Control cards for Cisco Optical Networking System (ONS) 15000 series nodes before 20060405 allow remote attackers to cause a denial of service (memory exhaustion and possibly card reset) by sending an invalid response when the final ACK is expected, aka bug ID CSCei45910." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "24434", "refsource": "OSVDB", "url": "http://www.osvdb.org/24434" }, { "name": "1015872", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015872" }, { "name": "ADV-2006-1256", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "name": "19553", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19553" }, { "name": "17384", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17384" }, { "name": "20060405 Cisco Optical Networking System 15000 Series and Cisco Transport Controller Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" }, { "name": "cisco-ons-iplan-ack-dos(25643)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25643" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1670", "datePublished": "2006-04-07T10:00:00", "dateReserved": "2006-04-07T00:00:00", "dateUpdated": "2024-08-07T17:19:49.448Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-1671
Vulnerability from cvelistv5
Published
2006-04-07 10:00
Modified
2024-08-07 17:19
Severity ?
EPSS score ?
Summary
Control cards for Cisco Optical Networking System (ONS) 15000 series nodes before 20060405 allow remote attackers to cause a denial of service (card reset) via (1) a "crafted" IP packet to a device with secure mode EMS-to-network-element access, aka bug ID CSCsc51390; (2) a "crafted" IP packet to a device with IP on the LAN interface, aka bug ID CSCsd04168; and (3) a "malformed" OSPF packet, aka bug ID CSCsc54558.
References
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/24435 | vdb-entry, x_refsource_OSVDB | |
http://securitytracker.com/id?1015872 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25644 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2006/1256 | vdb-entry, x_refsource_VUPEN | |
http://www.osvdb.org/24436 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25645 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/19553 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/17384 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.osvdb.org/24437 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25646 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:19:49.275Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "24435", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/24435" }, { "name": "1015872", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015872" }, { "name": "cisco-ons-cc-ems-dos(25644)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25644" }, { "name": "ADV-2006-1256", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "name": "24436", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/24436" }, { "name": "cisco-ons-cc-ip-dos(25645)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25645" }, { "name": "19553", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19553" }, { "name": "17384", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17384" }, { "name": "20060405 Cisco Optical Networking System 15000 Series and Cisco Transport Controller Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" }, { "name": "24437", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/24437" }, { "name": "cisco-ons-ospf-dos(25646)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25646" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Control cards for Cisco Optical Networking System (ONS) 15000 series nodes before 20060405 allow remote attackers to cause a denial of service (card reset) via (1) a \"crafted\" IP packet to a device with secure mode EMS-to-network-element access, aka bug ID CSCsc51390; (2) a \"crafted\" IP packet to a device with IP on the LAN interface, aka bug ID CSCsd04168; and (3) a \"malformed\" OSPF packet, aka bug ID CSCsc54558." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "24435", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/24435" }, { "name": "1015872", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015872" }, { "name": "cisco-ons-cc-ems-dos(25644)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25644" }, { "name": "ADV-2006-1256", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "name": "24436", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/24436" }, { "name": "cisco-ons-cc-ip-dos(25645)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25645" }, { "name": "19553", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19553" }, { "name": "17384", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17384" }, { "name": "20060405 Cisco Optical Networking System 15000 Series and Cisco Transport Controller Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" }, { "name": "24437", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/24437" }, { "name": "cisco-ons-ospf-dos(25646)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25646" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1671", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Control cards for Cisco Optical Networking System (ONS) 15000 series nodes before 20060405 allow remote attackers to cause a denial of service (card reset) via (1) a \"crafted\" IP packet to a device with secure mode EMS-to-network-element access, aka bug ID CSCsc51390; (2) a \"crafted\" IP packet to a device with IP on the LAN interface, aka bug ID CSCsd04168; and (3) a \"malformed\" OSPF packet, aka bug ID CSCsc54558." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "24435", "refsource": "OSVDB", "url": "http://www.osvdb.org/24435" }, { "name": "1015872", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015872" }, { "name": "cisco-ons-cc-ems-dos(25644)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25644" }, { "name": "ADV-2006-1256", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "name": "24436", "refsource": "OSVDB", "url": "http://www.osvdb.org/24436" }, { "name": "cisco-ons-cc-ip-dos(25645)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25645" }, { "name": "19553", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19553" }, { "name": "17384", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17384" }, { "name": "20060405 Cisco Optical Networking System 15000 Series and Cisco Transport Controller Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" }, { "name": "24437", "refsource": "OSVDB", "url": "http://www.osvdb.org/24437" }, { "name": "cisco-ons-ospf-dos(25646)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25646" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1671", "datePublished": "2006-04-07T10:00:00", "dateReserved": "2006-04-07T00:00:00", "dateUpdated": "2024-08-07T17:19:49.275Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0308
Vulnerability from cvelistv5
Published
2004-03-18 05:00
Modified
2024-08-08 00:17
Severity ?
EPSS score ?
Summary
Unknown vulnerability in Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS15600 before 1.3(0) allows a superuser whose account is locked out, disabled, or suspended to gain unauthorized access via a Telnet connection to the VxWorks shell.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15266 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/4010 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/9699 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:17:14.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040219 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "name": "cisco-ons-gain-access(15266)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15266" }, { "name": "4010", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/4010" }, { "name": "9699", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9699" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS15600 before 1.3(0) allows a superuser whose account is locked out, disabled, or suspended to gain unauthorized access via a Telnet connection to the VxWorks shell." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040219 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "name": "cisco-ons-gain-access(15266)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15266" }, { "name": "4010", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/4010" }, { "name": "9699", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9699" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS15600 before 1.3(0) allows a superuser whose account is locked out, disabled, or suspended to gain unauthorized access via a Telnet connection to the VxWorks shell." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040219 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "name": "cisco-ons-gain-access(15266)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15266" }, { "name": "4010", "refsource": "OSVDB", "url": "http://www.osvdb.org/4010" }, { "name": "9699", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9699" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0308", "datePublished": "2004-03-18T05:00:00", "dateReserved": "2004-03-17T00:00:00", "dateUpdated": "2024-08-08T00:17:14.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-0567
Vulnerability from cvelistv5
Published
2003-07-25 04:00
Modified
2024-08-08 01:58
Severity ?
EPSS score ?
Summary
Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/411332 | third-party-advisory, x_refsource_CERT-VN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5603 | vdb-entry, signature, x_refsource_OVAL | |
http://www.cert.org/advisories/CA-2003-17.html | third-party-advisory, x_refsource_CERT | |
http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.cert.org/advisories/CA-2003-15.html | third-party-advisory, x_refsource_CERT | |
http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006743.html | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:58:11.019Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#411332", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/411332" }, { "name": "oval:org.mitre.oval:def:5603", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5603" }, { "name": "CA-2003-17", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2003-17.html" }, { "name": "20030717 IOS Interface Blocked by IPv4 Packet", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml" }, { "name": "CA-2003-15", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2003-15.html" }, { "name": "20030718 (no subject)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006743.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "VU#411332", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/411332" }, { "name": "oval:org.mitre.oval:def:5603", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5603" }, { "name": "CA-2003-17", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2003-17.html" }, { "name": "20030717 IOS Interface Blocked by IPv4 Packet", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml" }, { "name": "CA-2003-15", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2003-15.html" }, { "name": "20030718 (no subject)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006743.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0567", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#411332", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/411332" }, { "name": "oval:org.mitre.oval:def:5603", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5603" }, { "name": "CA-2003-17", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2003-17.html" }, { "name": "20030717 IOS Interface Blocked by IPv4 Packet", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml" }, { "name": "CA-2003-15", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2003-15.html" }, { "name": "20030718 (no subject)", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006743.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0567", "datePublished": "2003-07-25T04:00:00", "dateReserved": "2003-07-16T00:00:00", "dateUpdated": "2024-08-08T01:58:11.019Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-1435
Vulnerability from cvelistv5
Published
2005-02-13 05:00
Modified
2024-08-08 00:53
Severity ?
EPSS score ?
Summary
Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via a large number of TCP connections with an invalid response instead of the final ACK (TCP-ACK).
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml | vendor-advisory, x_refsource_CISCO | |
http://secunia.com/advisories/12117 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/10768 | vdb-entry, x_refsource_BID | |
http://www.kb.cert.org/vuls/id/277048 | third-party-advisory, x_refsource_CERT-VN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16763 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:53:23.598Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "12117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10768" }, { "name": "VU#277048", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/277048" }, { "name": "cisco-ons-tcp-ack-dos(16763)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16763" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-07-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via a large number of TCP connections with an invalid response instead of the final ACK (TCP-ACK)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "12117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10768" }, { "name": "VU#277048", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/277048" }, { "name": "cisco-ons-tcp-ack-dos(16763)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16763" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via a large number of TCP connections with an invalid response instead of the final ACK (TCP-ACK)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "12117", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10768" }, { "name": "VU#277048", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/277048" }, { "name": "cisco-ons-tcp-ack-dos(16763)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16763" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1435", "datePublished": "2005-02-13T05:00:00", "dateReserved": "2005-02-13T00:00:00", "dateUpdated": "2024-08-08T00:53:23.598Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2003-03-31 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
Cisco ONS15454 and ONS15327 running ONS before 3.4 uses a "public" SNMP community string that cannot be changed, which allows remote attackers to obtain sensitive information.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.iss.net/security_center/static/10507.php | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/6081 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/10507.php | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/6081 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | optical_networking_systems_software | 3.0 | |
cisco | optical_networking_systems_software | 3.1.0 | |
cisco | optical_networking_systems_software | 3.2 | |
cisco | optical_networking_systems_software | 3.2.0 | |
cisco | optical_networking_systems_software | 3.3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 uses a \"public\" SNMP community string that cannot be changed, which allows remote attackers to obtain sensitive information." } ], "id": "CVE-2002-1555", "lastModified": "2024-11-20T23:41:34.930", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-03-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10507.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6081" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10507.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6081" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-04-07 10:04
Modified
2024-11-21 00:09
Severity ?
Summary
Control cards for Cisco Optical Networking System (ONS) 15000 series nodes before 20060405 allow remote attackers to cause a denial of service (card reset) via (1) a "crafted" IP packet to a device with secure mode EMS-to-network-element access, aka bug ID CSCsc51390; (2) a "crafted" IP packet to a device with IP on the LAN interface, aka bug ID CSCsd04168; and (3) a "malformed" OSPF packet, aka bug ID CSCsc54558.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:transport_controller:4.0.x:*:*:*:*:*:*:*", "matchCriteriaId": "A5F7F982-4359-4107-843C-E54CDA4A9E89", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D1888FF-6126-4F40-A7EA-1ED5123FA729", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "15B6D45F-25A7-4055-9D9C-42DEACBFFE17", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "31461FAA-2F90-47B0-BDA3-D81A8186960C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2EF8D104-CABD-4036-A4AF-68B80D83AE34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.3\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "5331AAD2-7E21-4407-9DF7-9D2A8058FAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "04472ED2-EB97-47E1-938E-D69C363E81C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "10988AA9-A807-4E70-8197-6F9EFC13AE86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8951276-CDEF-4F54-93DF-B96DB10E6530", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5A594C2-98BB-4AC5-9CC5-89FE97D63323", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B35325A-98F6-41DF-ADD8-91ED992A3ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0B06C5B-73C2-47F1-9ED6-B59F9C1C5AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9758019-F6EA-4552-B070-5A9EBE73BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "44DDAC96-7467-4FFF-B337-C0475B7214B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "4DEC7814-61D4-420A-AB81-6720F3C2D6B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "413133A5-F600-4B2B-82E1-3EAC10B7E6F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ons_15310-cl_series:0:*:*:*:*:*:*:*", "matchCriteriaId": "727F672F-6227-4DF3-86A7-A259F97EB92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ons_15600:0:*:*:*:*:*:*:*", "matchCriteriaId": "D6E7CD66-ADA5-4397-9A59-E5C6B51B8A2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ons_15454_mspp:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E3A7E4-39CD-44B9-B72D-0C9B810A2158", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Control cards for Cisco Optical Networking System (ONS) 15000 series nodes before 20060405 allow remote attackers to cause a denial of service (card reset) via (1) a \"crafted\" IP packet to a device with secure mode EMS-to-network-element access, aka bug ID CSCsc51390; (2) a \"crafted\" IP packet to a device with IP on the LAN interface, aka bug ID CSCsd04168; and (3) a \"malformed\" OSPF packet, aka bug ID CSCsc54558." } ], "evaluatorSolution": "The vendor has released fixes to address these issues.", "id": "CVE-2006-1671", "lastModified": "2024-11-21T00:09:26.997", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-04-07T10:04:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/19553" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015872" }, { "source": "cve@mitre.org", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/24435" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/24436" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/24437" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/17384" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25644" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25645" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25646" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/24435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/24436" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/24437" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25644" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25646" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-04-07 10:04
Modified
2024-11-21 00:09
Severity ?
Summary
Control cards for Cisco Optical Networking System (ONS) 15000 series nodes before 20060405 allow remote attackers to cause a denial of service (memory exhaustion and possibly card reset) by sending an invalid response when the final ACK is expected, aka bug ID CSCei45910.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D1888FF-6126-4F40-A7EA-1ED5123FA729", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "15B6D45F-25A7-4055-9D9C-42DEACBFFE17", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "31461FAA-2F90-47B0-BDA3-D81A8186960C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2EF8D104-CABD-4036-A4AF-68B80D83AE34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.3\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "5331AAD2-7E21-4407-9DF7-9D2A8058FAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "04472ED2-EB97-47E1-938E-D69C363E81C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "10988AA9-A807-4E70-8197-6F9EFC13AE86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8951276-CDEF-4F54-93DF-B96DB10E6530", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5A594C2-98BB-4AC5-9CC5-89FE97D63323", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B35325A-98F6-41DF-ADD8-91ED992A3ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0B06C5B-73C2-47F1-9ED6-B59F9C1C5AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9758019-F6EA-4552-B070-5A9EBE73BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "44DDAC96-7467-4FFF-B337-C0475B7214B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "4DEC7814-61D4-420A-AB81-6720F3C2D6B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "413133A5-F600-4B2B-82E1-3EAC10B7E6F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ons_15310-cl_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "32B96C9A-FA1D-4E74-95C2-4355ED257FB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ons_15600:*:*:*:*:*:*:*:*", "matchCriteriaId": "811149AD-89DC-4D93-A598-F6318C9EA64B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ons_15454_mspp:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E3A7E4-39CD-44B9-B72D-0C9B810A2158", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ons_15454_mstp:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B98B943-24D6-4B37-A44F-0E3985BBB54E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Control cards for Cisco Optical Networking System (ONS) 15000 series nodes before 20060405 allow remote attackers to cause a denial of service (memory exhaustion and possibly card reset) by sending an invalid response when the final ACK is expected, aka bug ID CSCei45910." } ], "id": "CVE-2006-1670", "lastModified": "2024-11-21T00:09:26.830", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-04-07T10:04:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/19553" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015872" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/24434" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/17384" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25643" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/24434" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/17384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25643" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:50
Severity ?
Summary
The Transaction Language 1 (TL1) login interface in Cisco ONS 15327 4.6(0) and 4.6(1) and 15454 and 15454 SDH 4.6(0) and 4.6(1), when a user account is configured with a blank password, allows remote attackers to gain unauthorized access by logging in with a password larger than 10 characters.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D1888FF-6126-4F40-A7EA-1ED5123FA729", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "15B6D45F-25A7-4055-9D9C-42DEACBFFE17", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "31461FAA-2F90-47B0-BDA3-D81A8186960C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2EF8D104-CABD-4036-A4AF-68B80D83AE34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.3\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "5331AAD2-7E21-4407-9DF7-9D2A8058FAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:2.3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "C89112E5-3FAC-4E4A-9C7D-F60BCF4A28E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "04472ED2-EB97-47E1-938E-D69C363E81C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "C607FB31-58DF-4C65-A35B-C9C1A6437CA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "10988AA9-A807-4E70-8197-6F9EFC13AE86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8951276-CDEF-4F54-93DF-B96DB10E6530", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5A594C2-98BB-4AC5-9CC5-89FE97D63323", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B35325A-98F6-41DF-ADD8-91ED992A3ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0B06C5B-73C2-47F1-9ED6-B59F9C1C5AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9758019-F6EA-4552-B070-5A9EBE73BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA524BE1-6B13-455A-96EA-17C1A71BD0F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "4DEC7814-61D4-420A-AB81-6720F3C2D6B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "413133A5-F600-4B2B-82E1-3EAC10B7E6F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Transaction Language 1 (TL1) login interface in Cisco ONS 15327 4.6(0) and 4.6(1) and 15454 and 15454 SDH 4.6(0) and 4.6(1), when a user account is configured with a blank password, allows remote attackers to gain unauthorized access by logging in with a password larger than 10 characters." } ], "id": "CVE-2004-1436", "lastModified": "2024-11-20T23:50:52.670", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/12117" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/760432" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/10768" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/12117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/760432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/10768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16766" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-03-31 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset) via an HTTP request to the TCC, TCC+ or XTC, in which the request contains an invalid CORBA Interoperable Object Reference (IOR).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.iss.net/security_center/static/10508.php | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/6084 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/10508.php | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/6084 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | optical_networking_systems_software | 3.0 | |
cisco | optical_networking_systems_software | 3.1.0 | |
cisco | optical_networking_systems_software | 3.2 | |
cisco | optical_networking_systems_software | 3.2.0 | |
cisco | optical_networking_systems_software | 3.3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset) via an HTTP request to the TCC, TCC+ or XTC, in which the request contains an invalid CORBA Interoperable Object Reference (IOR)." } ], "id": "CVE-2002-1556", "lastModified": "2024-11-20T23:41:35.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-03-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10508.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10508.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6084" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:50
Severity ?
Summary
Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, and ONS 15600 1.x(x), allows remote attackers to cause a denial of service (control card reset) via malformed (1) TCP and (2) UDP packets.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D1888FF-6126-4F40-A7EA-1ED5123FA729", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "15B6D45F-25A7-4055-9D9C-42DEACBFFE17", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "31461FAA-2F90-47B0-BDA3-D81A8186960C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2EF8D104-CABD-4036-A4AF-68B80D83AE34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.3\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "5331AAD2-7E21-4407-9DF7-9D2A8058FAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:2.3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "C89112E5-3FAC-4E4A-9C7D-F60BCF4A28E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "04472ED2-EB97-47E1-938E-D69C363E81C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "C607FB31-58DF-4C65-A35B-C9C1A6437CA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "10988AA9-A807-4E70-8197-6F9EFC13AE86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8951276-CDEF-4F54-93DF-B96DB10E6530", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5A594C2-98BB-4AC5-9CC5-89FE97D63323", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B35325A-98F6-41DF-ADD8-91ED992A3ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0B06C5B-73C2-47F1-9ED6-B59F9C1C5AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9758019-F6EA-4552-B070-5A9EBE73BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA524BE1-6B13-455A-96EA-17C1A71BD0F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "4DEC7814-61D4-420A-AB81-6720F3C2D6B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "413133A5-F600-4B2B-82E1-3EAC10B7E6F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, and ONS 15600 1.x(x), allows remote attackers to cause a denial of service (control card reset) via malformed (1) TCP and (2) UDP packets." } ], "id": "CVE-2004-1433", "lastModified": "2024-11-20T23:50:52.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/12117" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/486224" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/800384" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/10768" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16762" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16764" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/12117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/486224" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/800384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/10768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16764" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-03-31 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
Cisco ONS15454 and ONS15327 running ONS before 3.4 allows remote attackers to modify the system configuration and delete files by establishing an FTP connection to the TCC, TCC+ or XTC using a username and password that does not exist.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.iss.net/security_center/static/10505.php | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/6076 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/10505.php | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/6076 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | optical_networking_systems_software | 3.0 | |
cisco | optical_networking_systems_software | 3.1.0 | |
cisco | optical_networking_systems_software | 3.2 | |
cisco | optical_networking_systems_software | 3.2.0 | |
cisco | optical_networking_systems_software | 3.3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 allows remote attackers to modify the system configuration and delete files by establishing an FTP connection to the TCC, TCC+ or XTC using a username and password that does not exist." } ], "id": "CVE-2002-1553", "lastModified": "2024-11-20T23:41:34.663", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-03-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10505.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10505.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6076" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-03-31 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
Cisco ONS15454 and ONS15327 running ONS before 3.4 stores usernames and passwords in cleartext in the image database for the TCC, TCC+ or XTC, which could allow attackers to gain privileges by obtaining the passwords from the image database or a backup.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.iss.net/security_center/static/10506.php | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/6078 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/10506.php | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/6078 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | optical_networking_systems_software | 3.0 | |
cisco | optical_networking_systems_software | 3.1.0 | |
cisco | optical_networking_systems_software | 3.2 | |
cisco | optical_networking_systems_software | 3.2.0 | |
cisco | optical_networking_systems_software | 3.3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 stores usernames and passwords in cleartext in the image database for the TCC, TCC+ or XTC, which could allow attackers to gain privileges by obtaining the passwords from the image database or a backup." } ], "id": "CVE-2002-1554", "lastModified": "2024-11-20T23:41:34.793", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-03-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10506.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10506.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6078" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-11-23 05:00
Modified
2024-11-20 23:48
Severity ?
Summary
Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), and ONS 15454 SD before 4.1(3) allows remote attackers to cause a denial of service (reset) by not sending the ACK portion of the TCP three-way handshake and sending an invalid response instead.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | optical_networking_systems_software | 1.0 | |
cisco | optical_networking_systems_software | 4.0\(1\) | |
cisco | optical_networking_systems_software | 4.0\(2\) | |
cisco | optical_networking_systems_software | 4.0.0 | |
cisco | optical_networking_systems_software | 4.1\(0\) | |
cisco | optical_networking_systems_software | 4.1\(1\) | |
cisco | optical_networking_systems_software | 4.1\(2\) | |
cisco | optical_networking_systems_software | 4.1\(3\) | |
cisco | optical_networking_systems_software | 4.1.0 | |
cisco | optical_networking_systems_software | 4.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D1888FF-6126-4F40-A7EA-1ED5123FA729", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "10988AA9-A807-4E70-8197-6F9EFC13AE86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8951276-CDEF-4F54-93DF-B96DB10E6530", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5A594C2-98BB-4AC5-9CC5-89FE97D63323", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B35325A-98F6-41DF-ADD8-91ED992A3ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0B06C5B-73C2-47F1-9ED6-B59F9C1C5AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9758019-F6EA-4552-B070-5A9EBE73BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E75DB3F4-94A8-4341-9C01-1F0DC25A3402", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA524BE1-6B13-455A-96EA-17C1A71BD0F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), and ONS 15454 SD before 4.1(3) allows remote attackers to cause a denial of service (reset) by not sending the ACK portion of the TCP three-way handshake and sending an invalid response instead." }, { "lang": "es", "value": "Cisco ONS 15327 anteriores a 4.1(3), ONS 15454 anteriores a 4.6(1), y ONS 15454 SD anteriores a 4.1(3) permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) no enviando la porci\u00f3n ACK del establecimiento de conexi\u00f3n en TCP 3 pasos, y enviando en su lugar una respuesta no v\u00e1lida." } ], "id": "CVE-2004-0307", "lastModified": "2024-11-20T23:48:17.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-11-23T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/4009" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9699" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/4009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9699" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15265" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-08-18 04:00
Modified
2024-11-20 23:45
Severity ?
Summary
Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "D626B494-6210-4F74-8D17-BA480B6665C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "82B6315D-7BEF-419F-9B93-3CF669E986D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1aa:*:*:*:*:*:*:*", "matchCriteriaId": "C2842913-FEFF-4443-809B-F1793DDD08AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1ca:*:*:*:*:*:*:*", "matchCriteriaId": "478D7C73-4039-4352-ADFF-55623B011C82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1cc:*:*:*:*:*:*:*", "matchCriteriaId": "D5F31EAA-F76F-4182-B90D-6997E52EEB25", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*", "matchCriteriaId": "E8026B11-6144-467F-8094-F4F73CD37526", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*", "matchCriteriaId": "0DC1411B-4E7E-4F57-B025-9FE27B09C7AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2sa:*:*:*:*:*:*:*", "matchCriteriaId": "AA95673E-1686-48D7-8FE9-99D8FAB47FCA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*", "matchCriteriaId": "655BB9C1-BA90-452E-A9C8-9B1E15B99650", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*", "matchCriteriaId": "12434A88-88C6-4749-981F-E2B4D725F48F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*", "matchCriteriaId": "4F7CF26C-AEAA-42D7-8136-56E77E73DCB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*", "matchCriteriaId": "1A4864A2-D6BB-4E2A-9AA4-519EE0732D16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", "matchCriteriaId": "2C398460-3F38-4AA7-A4B1-FD8A01588DB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*", "matchCriteriaId": "793F494D-F6BD-4B23-92BE-83B9DD9D4A5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*", "matchCriteriaId": "2B6B0C2F-2FBE-4422-AD30-305100C595CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*", "matchCriteriaId": "932C1AC0-0BD1-46DF-A241-AA71BBD785BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*", "matchCriteriaId": "DBEA01D2-B985-4575-AF00-144CE2E3024D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*", "matchCriteriaId": "5C11A2BE-19E7-4148-B3CC-B4956B07273E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0sy:*:*:*:*:*:*:*", "matchCriteriaId": "65E78DEE-1125-4183-A0CD-947B850E956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:*", "matchCriteriaId": "B6943D9D-4A73-4EB2-B5C5-B7132AFFBE2B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", "matchCriteriaId": "CA7F94E8-86FC-456B-A7BB-57953F67F754", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0w5:*:*:*:*:*:*:*", "matchCriteriaId": "5A92DCEF-C205-4145-91B0-DB9991130457", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*", "matchCriteriaId": "C8B5CC91-144D-4818-871E-E6120A7E1050", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*", "matchCriteriaId": "23E5F43E-20DA-4C5C-B8C5-1A5512CA07B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*", "matchCriteriaId": "1050ACB3-E5B2-4710-910B-F3DF4B49907F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*", "matchCriteriaId": "5ABE71F9-17D4-47C4-A762-18CC8716E477", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*", "matchCriteriaId": "7977DA9F-41DE-4482-B0CD-896EEEFB5689", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*", "matchCriteriaId": "6D0A8D1D-ED94-4A2E-ACC5-0408C2C9FCFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*", "matchCriteriaId": "1ADAB898-7728-4C14-B69A-7B8B06AFC894", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*", "matchCriteriaId": "DDBE69A0-85B1-423B-88FB-CDA80E9186EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*", "matchCriteriaId": "C14C28A4-91C1-4AE0-8A14-8E98A569F7B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*", "matchCriteriaId": "54424787-34AC-410D-985F-511ADB2BB144", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*", "matchCriteriaId": "70F54F0C-AC91-4CB7-9FEB-257F03547864", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*", "matchCriteriaId": "B6A0D017-F26F-4429-891E-C7E1C66B6588", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*", "matchCriteriaId": "26FA075D-4A9E-44EE-90CF-23947C9040EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*", "matchCriteriaId": "9A3DFAEC-4534-4A8D-9886-0723F57C7A63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*", "matchCriteriaId": "E5451772-87D4-42E2-8F48-D137670DA3E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*", "matchCriteriaId": "D162976F-87A3-42BF-8C9F-A981B14F4673", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*", "matchCriteriaId": "E2606209-91BE-4BEB-A163-0D3873A033FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*", "matchCriteriaId": "43581A57-418A-4A35-ACF2-1380A8DA8A82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*", "matchCriteriaId": "AC17E231-9256-4600-A33B-238E7E83CF85", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*", "matchCriteriaId": "7A6D5468-BB6A-4665-964F-D8F636359CCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*", "matchCriteriaId": "4D0082D5-CE3E-433A-84E9-1311C8B7899A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*", "matchCriteriaId": "00EB78A4-B386-4FCB-A21F-BD2B2EFC9616", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xw:*:*:*:*:*:*:*", "matchCriteriaId": "7ED30640-AABE-4CA2-8B45-509270748BBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*", "matchCriteriaId": "BA6FFE33-2891-48E5-9D0C-C52F88B2D76C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*", "matchCriteriaId": "442972CD-50D3-4C46-AB73-44AED94B9F88", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*", "matchCriteriaId": "19077C39-A27B-4EC3-A882-9AC826E61570", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*", "matchCriteriaId": "C9427851-B0DC-4CE6-8BFA-60619D1DC87C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*", "matchCriteriaId": "6D07DD94-0925-4FEE-9565-5F36B9AAF448", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*", "matchCriteriaId": "BC3A67F5-05C6-4097-A88E-0A0F165C12EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*", "matchCriteriaId": "7126E176-D739-4102-8F10-1EEB8C6A219D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*", "matchCriteriaId": "E90C0554-1A50-4341-AB07-80AA854673D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*", "matchCriteriaId": "4A8C5149-40F8-40C9-9FC3-7E7C68801320", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*", "matchCriteriaId": "46FF39C5-CC37-4573-BB18-36254D38509B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ev:*:*:*:*:*:*:*", "matchCriteriaId": "896A71EC-9508-406F-8DE8-58953D9A30FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*", "matchCriteriaId": "E2B15FCC-1BB3-41CA-9550-6D55DD381F25", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*", "matchCriteriaId": "F4A85892-C3AB-4920-A949-A71BD0332D62", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*", "matchCriteriaId": "C6330829-9A7B-479D-B38B-BC64148EC172", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1m:*:*:*:*:*:*:*", "matchCriteriaId": "E6B13CDA-C376-412A-AF5D-8FC25C74A0A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*", "matchCriteriaId": "752C3C6B-910D-4153-A162-DF255F60306B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*", "matchCriteriaId": "C1BBE2FF-5DAE-447A-9C3D-3F48B24AECA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*", "matchCriteriaId": "297FAD97-60C0-473D-A18D-03657B81B7E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*", "matchCriteriaId": "2AD4A33B-B13E-40C6-B47F-A406ACC6664F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*", "matchCriteriaId": "0E488E6E-87F0-4292-B97B-31087FDB4655", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*", "matchCriteriaId": "0D199CB1-A2A3-4678-9503-C5B61281755C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*", "matchCriteriaId": "D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*", "matchCriteriaId": "19952DC6-1186-4754-BB1E-BA1D78A19C96", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*", "matchCriteriaId": "441CB9D6-5EDB-457B-B59E-D48B01AEAF5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*", "matchCriteriaId": "28097F62-B51F-4A3B-BB31-6FA67E8C8B5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*", "matchCriteriaId": "80E8AF76-0A1D-4BAE-BF10-D63080352E6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*", "matchCriteriaId": "8A11AF3F-C82F-4431-9CF1-84FDAD388D04", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*", "matchCriteriaId": "3B674647-4438-4450-9DCA-25184D4E2682", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*", "matchCriteriaId": "86E5CC41-1344-4A65-A653-8012ACE2CF2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*", "matchCriteriaId": "71FB7128-CF11-4903-97D7-418403A03CD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*", "matchCriteriaId": "63EFB20A-78E2-4BA1-B87C-BB74E8982D99", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*", "matchCriteriaId": "3A273401-9394-4BC3-879C-DE3EFC09B3F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*", "matchCriteriaId": "6DABF911-FCDF-4095-A95D-4BB73628FCA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*", "matchCriteriaId": "77886493-C30E-439E-BBB4-3D34A8938378", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*", "matchCriteriaId": "7813F511-CF6D-487F-9D1C-7A6CF85AD724", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*", "matchCriteriaId": "677DC4B6-8B3D-4A0D-9934-743FD7494DF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*", "matchCriteriaId": "E272881F-0804-4190-A21D-3D0B9A774F13", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*", "matchCriteriaId": "B12B39FE-3E7B-4D96-8CD4-0D57C50A786A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*", "matchCriteriaId": "F084DA16-24CB-41D1-92B7-C6E0499AAD10", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*", "matchCriteriaId": "BA979D75-F60E-45F8-B99C-1402DC8CFCDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*", "matchCriteriaId": "884753D4-3AF0-4723-9D51-26BA7B4CA533", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*", "matchCriteriaId": "DAF3601D-DF44-4A10-A424-8E97C65A36A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*", "matchCriteriaId": "BC38BD6C-9823-4D2A-8BE2-60AABE3C4932", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*", "matchCriteriaId": "C1835410-77EB-46F2-ACF0-379759D4B0D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*", "matchCriteriaId": "3BB103ED-B170-4193-84CD-4C59F4D6A10A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*", "matchCriteriaId": "F88DCCDE-6A81-473F-B4FE-95A84F8DF964", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*", "matchCriteriaId": "63D55886-268F-4E4D-B00F-8A5D97A73BA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yj:*:*:*:*:*:*:*", "matchCriteriaId": "4F7C6FB8-8393-4916-BB2B-3097B1995C23", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*", "matchCriteriaId": "E314B0F7-1A27-483E-B3B3-947A5561281F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*", "matchCriteriaId": "A3EF2531-3E6B-4FDC-B96B-2BC3F8EAF39A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*", "matchCriteriaId": "05B838C9-E60E-46A3-A5FB-4F67291D0851", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*", "matchCriteriaId": "2B29F111-CBA4-464D-8B25-C2677BA270EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*", "matchCriteriaId": "42EB3A6A-8B37-47E6-AA9B-1B13FC08F542", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*", "matchCriteriaId": "F4BA2D6E-FD22-4BFD-B8B4-D6542E173C72", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*", "matchCriteriaId": "78B9E2C6-0E23-4AC9-906F-28BBC15868DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*", "matchCriteriaId": "7B7EA3DA-33B3-4480-B3B8-413745D6C5FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41749-91FC-43DB-A52F-AC3E3A2205C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*", "matchCriteriaId": "EE0195AE-24FD-43B2-892B-F646B8B5ED6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*", "matchCriteriaId": "B98E703A-717D-4997-AFBC-CAE4B644025D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*", "matchCriteriaId": "6B27825D-099A-4733-8D3F-8EF2B050E5B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*", "matchCriteriaId": "D3A63E2B-8C1B-4EF7-BCDD-BBF3EC2C7113", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2mx:*:*:*:*:*:*:*", "matchCriteriaId": "ED8A1FE0-F74A-4C92-8625-7C933128B567", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*", "matchCriteriaId": "2D035A35-D53E-4C49-B4E4-F40B85866F27", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*", "matchCriteriaId": "4DE0B5B8-DEB1-4021-B854-177C0D9FD73A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*", "matchCriteriaId": "09458CD7-D430-4957-8506-FAB2A3E2AA65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*", "matchCriteriaId": "6E709D6B-61DB-4905-B539-B8488D7E2DC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*", "matchCriteriaId": "84900BB3-B49F-448A-9E04-FE423FBCCC4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*", "matchCriteriaId": "EAC6758B-C6EE-45CB-AC2D-28C4AE709DD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*", "matchCriteriaId": "075CD42D-070A-49BA-90D9-E7925BB41A38", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*", "matchCriteriaId": "DCB9967A-1EBD-4BE0-8651-1C7D42B2BF4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*", "matchCriteriaId": "4AB8E66C-A16F-4CC5-9FDF-AE274FF035EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*", "matchCriteriaId": "746DDC61-3981-4E93-A7EE-C120E0265485", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*", "matchCriteriaId": "FCC88CC5-CF58-48A3-AFB6-FD38E5F40845", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*", "matchCriteriaId": "5AF2C6C2-58E8-4EA6-84FB-4D11F31490A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*", "matchCriteriaId": "4628FDA0-4260-4493-92C9-4574E5EC06A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*", "matchCriteriaId": "F9FA064A-6E1A-4415-84D4-1A33FF667011", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*", "matchCriteriaId": "EE896909-F8C3-4723-B5E7-9FB5FA2B73B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*", "matchCriteriaId": "9F9CDCE5-F6D3-4FA3-ADA0-EED2517FF7EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*", "matchCriteriaId": "7E03EE34-C398-43B4-A529-BE7BAFA4B3C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*", "matchCriteriaId": "21147732-FA22-4728-B5F2-D115B78A8EDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*", "matchCriteriaId": "4D717498-4DF9-4D15-A25B-D777FF460E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*", "matchCriteriaId": "4B40548F-3914-4227-9E4C-F1B34071C069", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*", "matchCriteriaId": "C1C23EC9-C1C6-4F73-9FF5-24A5B97B8D91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*", "matchCriteriaId": "ECE49281-0571-49F7-95FF-68B1ACA07537", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*", "matchCriteriaId": "9B09B72E-6862-4115-9A0B-574089A94289", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*", "matchCriteriaId": "EC38B64C-E246-467F-A185-669497DEA839", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*", "matchCriteriaId": "6E5C90EE-A9C0-461C-9E89-732BFA9BD066", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*", "matchCriteriaId": "E74B6350-C2F8-4786-8E32-2ED6C188A5E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*", "matchCriteriaId": "F8E26473-A8EF-44C5-B550-5E0B86D31291", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*", "matchCriteriaId": "663FE3CE-FA09-46A2-9C0D-2797D9137A82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*", "matchCriteriaId": "86309E93-F2C9-4334-9A1C-989EFDC99215", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*", "matchCriteriaId": "9BFAF394-6E9A-4CD6-B8A6-5BDDE4EC8EC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*", "matchCriteriaId": "65318A70-40FF-4BE8-962B-DFCD5C476166", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*", "matchCriteriaId": "8B6DB954-EDC8-4A81-8C26-9D3DBC68FC67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*", "matchCriteriaId": "552C1E7A-2FFA-49BC-BF09-F0DE9B0C7502", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*", "matchCriteriaId": "869CEAF7-59D6-4651-8D89-0244D6C430A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*", "matchCriteriaId": "059FBAA6-3127-4DF9-99AD-AA3A16317B6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*", "matchCriteriaId": "0E0E376F-64E1-4632-9A8E-11DC99FB245F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*", "matchCriteriaId": "BF440B52-C6AE-4608-BE71-01B354D37BEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*", "matchCriteriaId": "243BEF5E-F693-450E-B274-FD7CF34B6771", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*", "matchCriteriaId": "E7918C59-1678-4F24-A7C2-68824D1B59A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*", "matchCriteriaId": "DE72804E-600D-47FA-B3BF-36BD3CF13A75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*", "matchCriteriaId": "DAD14B6D-CA11-41C1-9382-70CF1F5B4C8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ys:*:*:*:*:*:*:*", "matchCriteriaId": "7F5B9BAF-59BA-4282-B387-489264D44429", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*", "matchCriteriaId": "969A5BAA-19D5-4411-BABB-FE55DBA7C7D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*", "matchCriteriaId": "54B41182-7AA8-49D1-BAC3-EAF312E43553", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*", "matchCriteriaId": "E11BBB83-147B-4FBF-B263-77FCCFB2D92D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*", "matchCriteriaId": "2E84677D-793D-44C5-80E9-FC29C3183278", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*", "matchCriteriaId": "E70E5B1F-E72C-4DAB-B6FA-977EF04BFBDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*", "matchCriteriaId": "ECFA2358-6B79-472D-9092-FF99DC3DF042", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*", "matchCriteriaId": "A3C26842-FF50-436F-8DB6-15A70082CD1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*", "matchCriteriaId": "62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*", "matchCriteriaId": "9384B48D-0F62-4042-BE8F-9A8F5FE9A3D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*", "matchCriteriaId": "F4A31301-AAB0-4744-98B2-695D88798D9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*", "matchCriteriaId": "ECB4BA74-BE9F-43D5-9D0F-78F4F2BB19B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*", "matchCriteriaId": "0CEB27CF-46B5-4780-964C-C31193614B74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*", "matchCriteriaId": "0F1094F9-7222-4DE0-A368-7421ABA66E3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*", "matchCriteriaId": "6C7EA2BB-A52A-438C-8EB5-CD283CACBACE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*", "matchCriteriaId": "574FFD6F-D56C-41DB-A978-E501BA3CA5D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*", "matchCriteriaId": "11790F38-3720-45CF-9FD4-A8E5867684D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "04472ED2-EB97-47E1-938E-D69C363E81C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ons_15454_optical_transport_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F64E65F-87C1-4EA0-876E-1582F2988877", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full." }, { "lang": "es", "value": "Cisco IOS 11.x y 12.0 a 12.2 permite a atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo de tr\u00e1fico) enviando una cierta secuencia de paquetes IPv4 a una interfaz del dispositivo, causando que la cola de entrada de ese interfaz sea marcada como llena." } ], "id": "CVE-2003-0567", "lastModified": "2024-11-20T23:45:02.257", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-08-18T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006743.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2003-15.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2003-17.html" }, { "source": "cve@mitre.org", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/411332" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006743.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2003-15.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2003-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/411332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5603" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-03-31 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset to TCC, TCC+, TCCi or XTC) via a malformed HTTP request that does not contain a leading / (slash) character.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.iss.net/security_center/static/10509.php | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/6082 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/10509.php | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/6082 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | optical_networking_systems_software | 3.0 | |
cisco | optical_networking_systems_software | 3.1.0 | |
cisco | optical_networking_systems_software | 3.2 | |
cisco | optical_networking_systems_software | 3.2.0 | |
cisco | optical_networking_systems_software | 3.3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset to TCC, TCC+, TCCi or XTC) via a malformed HTTP request that does not contain a leading / (slash) character." } ], "id": "CVE-2002-1557", "lastModified": "2024-11-20T23:41:35.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-03-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10509.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10509.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6082" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:50
Severity ?
Summary
Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed (1) IP or (2) ICMP packets.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D1888FF-6126-4F40-A7EA-1ED5123FA729", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "15B6D45F-25A7-4055-9D9C-42DEACBFFE17", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "31461FAA-2F90-47B0-BDA3-D81A8186960C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2EF8D104-CABD-4036-A4AF-68B80D83AE34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.3\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "5331AAD2-7E21-4407-9DF7-9D2A8058FAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:2.3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "C89112E5-3FAC-4E4A-9C7D-F60BCF4A28E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "04472ED2-EB97-47E1-938E-D69C363E81C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "C607FB31-58DF-4C65-A35B-C9C1A6437CA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "10988AA9-A807-4E70-8197-6F9EFC13AE86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8951276-CDEF-4F54-93DF-B96DB10E6530", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5A594C2-98BB-4AC5-9CC5-89FE97D63323", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B35325A-98F6-41DF-ADD8-91ED992A3ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0B06C5B-73C2-47F1-9ED6-B59F9C1C5AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9758019-F6EA-4552-B070-5A9EBE73BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA524BE1-6B13-455A-96EA-17C1A71BD0F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "4DEC7814-61D4-420A-AB81-6720F3C2D6B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "413133A5-F600-4B2B-82E1-3EAC10B7E6F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed (1) IP or (2) ICMP packets." } ], "id": "CVE-2004-1432", "lastModified": "2024-11-20T23:50:52.060", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/12117" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/918920" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/969344" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/10768" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16760" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16761" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/12117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/918920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/969344" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/10768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16760" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16761" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:50
Severity ?
Summary
Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.1(0) to 4.1(2), 4.5(x), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed SNMP packets.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D1888FF-6126-4F40-A7EA-1ED5123FA729", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "15B6D45F-25A7-4055-9D9C-42DEACBFFE17", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "31461FAA-2F90-47B0-BDA3-D81A8186960C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2EF8D104-CABD-4036-A4AF-68B80D83AE34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.3\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "5331AAD2-7E21-4407-9DF7-9D2A8058FAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:2.3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "C89112E5-3FAC-4E4A-9C7D-F60BCF4A28E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "04472ED2-EB97-47E1-938E-D69C363E81C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "C607FB31-58DF-4C65-A35B-C9C1A6437CA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "10988AA9-A807-4E70-8197-6F9EFC13AE86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8951276-CDEF-4F54-93DF-B96DB10E6530", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5A594C2-98BB-4AC5-9CC5-89FE97D63323", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B35325A-98F6-41DF-ADD8-91ED992A3ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0B06C5B-73C2-47F1-9ED6-B59F9C1C5AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9758019-F6EA-4552-B070-5A9EBE73BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA524BE1-6B13-455A-96EA-17C1A71BD0F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "4DEC7814-61D4-420A-AB81-6720F3C2D6B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "413133A5-F600-4B2B-82E1-3EAC10B7E6F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.1(0) to 4.1(2), 4.5(x), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed SNMP packets." } ], "id": "CVE-2004-1434", "lastModified": "2024-11-20T23:50:52.347", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/12117" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/548968" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/10768" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/12117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/548968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/10768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16765" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:50
Severity ?
Summary
Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via a large number of TCP connections with an invalid response instead of the final ACK (TCP-ACK).
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D1888FF-6126-4F40-A7EA-1ED5123FA729", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "15B6D45F-25A7-4055-9D9C-42DEACBFFE17", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "31461FAA-2F90-47B0-BDA3-D81A8186960C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2EF8D104-CABD-4036-A4AF-68B80D83AE34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.3\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "5331AAD2-7E21-4407-9DF7-9D2A8058FAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:2.3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "C89112E5-3FAC-4E4A-9C7D-F60BCF4A28E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "04472ED2-EB97-47E1-938E-D69C363E81C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "C607FB31-58DF-4C65-A35B-C9C1A6437CA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "10988AA9-A807-4E70-8197-6F9EFC13AE86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8951276-CDEF-4F54-93DF-B96DB10E6530", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5A594C2-98BB-4AC5-9CC5-89FE97D63323", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B35325A-98F6-41DF-ADD8-91ED992A3ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0B06C5B-73C2-47F1-9ED6-B59F9C1C5AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9758019-F6EA-4552-B070-5A9EBE73BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA524BE1-6B13-455A-96EA-17C1A71BD0F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "4DEC7814-61D4-420A-AB81-6720F3C2D6B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "413133A5-F600-4B2B-82E1-3EAC10B7E6F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via a large number of TCP connections with an invalid response instead of the final ACK (TCP-ACK)." } ], "id": "CVE-2004-1435", "lastModified": "2024-11-20T23:50:52.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/12117" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/277048" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/10768" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/12117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/277048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/10768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16763" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-11-24 05:00
Modified
2024-11-20 23:48
Severity ?
Summary
Unknown vulnerability in Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS15600 before 1.3(0) allows a superuser whose account is locked out, disabled, or suspended to gain unauthorized access via a Telnet connection to the VxWorks shell.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | optical_networking_systems_software | 1.0 | |
cisco | optical_networking_systems_software | 4.0\(1\) | |
cisco | optical_networking_systems_software | 4.0\(2\) | |
cisco | optical_networking_systems_software | 4.0.0 | |
cisco | optical_networking_systems_software | 4.1\(0\) | |
cisco | optical_networking_systems_software | 4.1\(1\) | |
cisco | optical_networking_systems_software | 4.1\(2\) | |
cisco | optical_networking_systems_software | 4.1\(3\) | |
cisco | optical_networking_systems_software | 4.1.0 | |
cisco | optical_networking_systems_software | 4.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D1888FF-6126-4F40-A7EA-1ED5123FA729", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "10988AA9-A807-4E70-8197-6F9EFC13AE86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8951276-CDEF-4F54-93DF-B96DB10E6530", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5A594C2-98BB-4AC5-9CC5-89FE97D63323", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B35325A-98F6-41DF-ADD8-91ED992A3ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0B06C5B-73C2-47F1-9ED6-B59F9C1C5AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9758019-F6EA-4552-B070-5A9EBE73BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E75DB3F4-94A8-4341-9C01-1F0DC25A3402", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA524BE1-6B13-455A-96EA-17C1A71BD0F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS15600 before 1.3(0) allows a superuser whose account is locked out, disabled, or suspended to gain unauthorized access via a Telnet connection to the VxWorks shell." }, { "lang": "es", "value": "Vulnerabilidad desconocida en Cisco ONS 15327 anteriores a 4.1(3), ONS 15454 anteriores a 4.6(1), ONS 15454 SD anteriores a 4.1(3), y Cisco ONS15600 anteriores a 1.3(0) permiten a un superusuario cuya cuenta est\u00e1 bloquada, deshabilitada o suspendida ganar acceso no autorizado mediante una conexi\u00f3n Telnet al interfaz VxWorks." } ], "id": "CVE-2004-0308", "lastModified": "2024-11-20T23:48:17.380", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-11-24T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/4010" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9699" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/4010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9699" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15266" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-03-31 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
Cisco ONS15454 and ONS15327 running ONS before 3.4 have an account for the VxWorks Operating System in the TCC, TCC+ and XTC that cannot be changed or disabled, which allows remote attackers to gain privileges by connecting to the account via Telnet.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.iss.net/security_center/static/10510.php | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/6083 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/10510.php | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/6083 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | optical_networking_systems_software | 3.0 | |
cisco | optical_networking_systems_software | 3.1.0 | |
cisco | optical_networking_systems_software | 3.2 | |
cisco | optical_networking_systems_software | 3.2.0 | |
cisco | optical_networking_systems_software | 3.3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco ONS15454 and ONS15327 running ONS before 3.4 have an account for the VxWorks Operating System in the TCC, TCC+ and XTC that cannot be changed or disabled, which allows remote attackers to gain privileges by connecting to the account via Telnet." } ], "id": "CVE-2002-1558", "lastModified": "2024-11-20T23:41:35.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-03-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10510.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10510.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6083" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-11-23 05:00
Modified
2024-11-20 23:48
Severity ?
Summary
Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS 15600 before 1.3(0) enable TFTP service on UDP port 69 by default, which allows remote attackers to GET or PUT ONS system files on the current active TCC in the /flash0 or /flash1 directories.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | optical_networking_systems_software | 1.0 | |
cisco | optical_networking_systems_software | 4.0\(1\) | |
cisco | optical_networking_systems_software | 4.0\(2\) | |
cisco | optical_networking_systems_software | 4.0.0 | |
cisco | optical_networking_systems_software | 4.1\(0\) | |
cisco | optical_networking_systems_software | 4.1\(1\) | |
cisco | optical_networking_systems_software | 4.1\(2\) | |
cisco | optical_networking_systems_software | 4.1\(3\) | |
cisco | optical_networking_systems_software | 4.1.0 | |
cisco | optical_networking_systems_software | 4.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D1888FF-6126-4F40-A7EA-1ED5123FA729", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "10988AA9-A807-4E70-8197-6F9EFC13AE86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8951276-CDEF-4F54-93DF-B96DB10E6530", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5A594C2-98BB-4AC5-9CC5-89FE97D63323", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B35325A-98F6-41DF-ADD8-91ED992A3ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0B06C5B-73C2-47F1-9ED6-B59F9C1C5AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9758019-F6EA-4552-B070-5A9EBE73BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E75DB3F4-94A8-4341-9C01-1F0DC25A3402", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA524BE1-6B13-455A-96EA-17C1A71BD0F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS 15600 before 1.3(0) enable TFTP service on UDP port 69 by default, which allows remote attackers to GET or PUT ONS system files on the current active TCC in the /flash0 or /flash1 directories." }, { "lang": "es", "value": "Cisco ONS 15327 anteriores a 4.1(3), ONS 15454 anteriores a 4.6(1), ONS 15454 SD anteriores a 4.1(3), y Cisco ONS 15600 anteriores a 1.3(0) tienen activo el servicio TFTP en el puerto UDP 69 por defecto, lo que permite a atacantes remotos obtener (GET) o poner (PUT ON) ficheros de sistema en TCC activo acual en los directorios /flash0 y /flash1." } ], "id": "CVE-2004-0306", "lastModified": "2024-11-20T23:48:17.083", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-11-23T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9699" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15264" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9699" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15264" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-10-04 04:00
Modified
2024-11-20 23:40
Severity ?
Summary
Cisco ONS15454 optical transport platform running ONS 3.1.0 to 3.2.0 allows remote attackers to cause a denial of service (reset) by sending IP packets with non-zero Type of Service (TOS) bits to the Timing Control Card (TCC) LAN interface.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | optical_networking_systems_software | 3.1.0 | |
cisco | optical_networking_systems_software | 3.2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco ONS15454 optical transport platform running ONS 3.1.0 to 3.2.0 allows remote attackers to cause a denial of service (reset) by sending IP packets with non-zero Type of Service (TOS) bits to the Timing Control Card (TCC) LAN interface." } ], "id": "CVE-2002-0952", "lastModified": "2024-11-20T23:40:15.323", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-10-04T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.cisco.com/warp/public/707/ons-tos-vuln-pub.shtml" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/9377.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cisco.com/warp/public/707/ons-tos-vuln-pub.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/9377.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5058" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-04-07 10:04
Modified
2024-11-21 00:09
Severity ?
Summary
The installation of Cisco Transport Controller (CTC) for Cisco Optical Networking System (ONS) 15000 series nodes adds a Java policy file entry with a wildcard that grants the java.security.AllPermission permission to any http URL containing "fs/LAUNCHER.jar", which allows remote attackers to execute arbitrary code on a CTC workstation, aka bug ID CSCea25049.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:transport_controller:4.0.x:*:*:*:*:*:*:*", "matchCriteriaId": "A5F7F982-4359-4107-843C-E54CDA4A9E89", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D1888FF-6126-4F40-A7EA-1ED5123FA729", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "15B6D45F-25A7-4055-9D9C-42DEACBFFE17", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "31461FAA-2F90-47B0-BDA3-D81A8186960C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2EF8D104-CABD-4036-A4AF-68B80D83AE34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.3\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "5331AAD2-7E21-4407-9DF7-9D2A8058FAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "04472ED2-EB97-47E1-938E-D69C363E81C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "10988AA9-A807-4E70-8197-6F9EFC13AE86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8951276-CDEF-4F54-93DF-B96DB10E6530", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5A594C2-98BB-4AC5-9CC5-89FE97D63323", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B35325A-98F6-41DF-ADD8-91ED992A3ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0B06C5B-73C2-47F1-9ED6-B59F9C1C5AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9758019-F6EA-4552-B070-5A9EBE73BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "44DDAC96-7467-4FFF-B337-C0475B7214B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "4DEC7814-61D4-420A-AB81-6720F3C2D6B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "413133A5-F600-4B2B-82E1-3EAC10B7E6F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ons_15310-cl_series:0:*:*:*:*:*:*:*", "matchCriteriaId": "727F672F-6227-4DF3-86A7-A259F97EB92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ons_15600:0:*:*:*:*:*:*:*", "matchCriteriaId": "D6E7CD66-ADA5-4397-9A59-E5C6B51B8A2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ons_15454_mspp:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E3A7E4-39CD-44B9-B72D-0C9B810A2158", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The installation of Cisco Transport Controller (CTC) for Cisco Optical Networking System (ONS) 15000 series nodes adds a Java policy file entry with a wildcard that grants the java.security.AllPermission permission to any http URL containing \"fs/LAUNCHER.jar\", which allows remote attackers to execute arbitrary code on a CTC workstation, aka bug ID CSCea25049." } ], "id": "CVE-2006-1672", "lastModified": "2024-11-21T00:09:27.163", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-04-07T10:04:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/19553" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015871" }, { "source": "cve@mitre.org", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/24438" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/17384" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015871" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060405-ons.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/24438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25647" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-07-27 04:00
Modified
2024-11-20 23:49
Severity ?
Summary
Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption).
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(23\\)s4:*:*:*:*:*:*:*", "matchCriteriaId": "332C413B-7AC7-4475-A968-9D0B7EF14B6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(23\\)s5:*:*:*:*:*:*:*", "matchCriteriaId": "35999D5E-F831-446C-B509-F1531A2D1DCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(24\\)s4:*:*:*:*:*:*:*", "matchCriteriaId": "58DF5979-73D5-4B2E-B98E-CD0AB8517F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(24\\)s5:*:*:*:*:*:*:*", "matchCriteriaId": "1EA92F7A-C14E-4186-8E96-51D2BDC40DE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(26\\)s1:*:*:*:*:*:*:*", "matchCriteriaId": "179CEE21-E5CA-466A-BAF0-8936F2E0B06F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(27\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "00682210-2C86-4912-A423-5F7011C2FA2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv:*:*:*:*:*:*:*", "matchCriteriaId": "498F4C0D-393D-4406-9752-4E49D6BB42B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv1:*:*:*:*:*:*:*", "matchCriteriaId": "E9C87916-D186-4E36-A4B6-5FA858FFC7E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", "matchCriteriaId": "2C398460-3F38-4AA7-A4B1-FD8A01588DB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0sv:*:*:*:*:*:*:*", "matchCriteriaId": "3999B90E-FE66-4B5D-8186-66C658855D7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "D0C3B6E2-3D33-457E-B85D-8C2FC9DA2FE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "C41AB141-A566-4738-8E07-E6410590FB0A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "F074DF74-81FA-4F09-A6E5-18DD9A4E76C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*", "matchCriteriaId": "E4041EB0-F402-4C01-9337-212E3E461AF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec:*:*:*:*:*:*:*", "matchCriteriaId": "0DEB16EF-D0C1-4C56-85B1-3C07D8CFD493", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec1:*:*:*:*:*:*:*", "matchCriteriaId": "DFCFD88F-4320-4F4F-9CAD-BA8A5AA5D389", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo:*:*:*:*:*:*:*", "matchCriteriaId": "ABF2BEC0-6D37-4BC2-9A78-FC0D06CE7573", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew:*:*:*:*:*:*:*", "matchCriteriaId": "379E0F70-EE01-48F9-A4F0-BFCF9BDAB4AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew1:*:*:*:*:*:*:*", "matchCriteriaId": "17CD0C63-7500-4A32-BD85-27E6C2F70FB3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*", "matchCriteriaId": "7126E176-D739-4102-8F10-1EEB8C6A219D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*", "matchCriteriaId": "E90C0554-1A50-4341-AB07-80AA854673D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*", "matchCriteriaId": "4A8C5149-40F8-40C9-9FC3-7E7C68801320", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*", "matchCriteriaId": "46FF39C5-CC37-4573-BB18-36254D38509B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*", "matchCriteriaId": "C1AF45D8-A32A-482F-8183-F0DC3C4FB5DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*", "matchCriteriaId": "B377A8B9-90F2-41B7-9098-5ABEB621E2E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*", "matchCriteriaId": "E2B15FCC-1BB3-41CA-9550-6D55DD381F25", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(12g\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B7CC6B5-44B7-4DCA-86C8-F032AF65FDAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(12h\\):*:*:*:*:*:*:*", "matchCriteriaId": "208A52BF-BAE3-4F5F-9279-88C360FDCBC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "10151339-0261-4F5D-9601-F048C0B70908", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s1:*:*:*:*:*:*:*", "matchCriteriaId": "2498113D-65B7-4144-AD1C-9FCB6534B7BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "9324BF58-67E2-410D-AA71-F280B3D64498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(21a\\):*:*:*:*:*:*:*", "matchCriteriaId": "060D7CA2-0A02-49E3-BCFB-EFE7F6EC08F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(23\\):*:*:*:*:*:*:*", "matchCriteriaId": "947062EE-A5CF-4A7F-8EF7-921F45118268", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*", "matchCriteriaId": "2D035A35-D53E-4C49-B4E4-F40B85866F27", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*", "matchCriteriaId": "5DEF14D5-1327-4012-913F-DA0E12C4E953", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zq:*:*:*:*:*:*:*", "matchCriteriaId": "94E748F5-FA9B-4627-AB30-5414A2952ADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "0668C45B-9D25-424B-B876-C1721BFFE5DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)t3:*:*:*:*:*:*:*", "matchCriteriaId": "19940BFF-0888-4717-AC5F-87A85BE165A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc1:*:*:*:*:*:*:*", "matchCriteriaId": "9E5A2A58-D7B2-4018-BAAE-D6CB49A3A709", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc2:*:*:*:*:*:*:*", "matchCriteriaId": "1C268494-F83A-488D-AEE6-AF7D319B6F64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "68BCC003-3F88-4369-A387-6B8D0FDFBE32", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t1:*:*:*:*:*:*:*", "matchCriteriaId": "8DD45AA0-EEE1-43FF-B04D-4063769D71AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t2:*:*:*:*:*:*:*", "matchCriteriaId": "7873D1DB-80D0-4076-8716-7618D7161EE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t3:*:*:*:*:*:*:*", "matchCriteriaId": "DF292613-B9BC-4CF1-A6FA-4AFC077D8632", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd:*:*:*:*:*:*:*", "matchCriteriaId": "23B1AF9D-106A-43CB-972C-5E85ADFC355D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd1:*:*:*:*:*:*:*", "matchCriteriaId": "25C6BBA6-8D45-4BA7-B88E-44D9ECE88009", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CF0189B-964F-46EC-BE5F-8076CFE7AB8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "53430E70-FBAD-42F7-8614-7AB04E566810", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b:*:*:*:*:*:*:*", "matchCriteriaId": "B670057C-7A86-4F61-8FF5-88E6BFE2B5F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(5b\\):*:*:*:*:*:*:*", "matchCriteriaId": "4403BFFB-8A89-4512-8030-5DEDC0C0FF93", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2D9B4FE3-7A03-430F-AE68-743559D74DEC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*", "matchCriteriaId": "292F6F99-19B3-4106-A432-5DE916CCDD56", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*", "matchCriteriaId": "C0C3B413-76F7-413B-A51F-29834F9DE722", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*", "matchCriteriaId": "A9F12741-69FB-46DD-A670-8461492B338A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*", "matchCriteriaId": "7EC2D158-6174-4AE8-83DA-125B072B6980", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*", "matchCriteriaId": "A5688D88-A550-43EB-8854-2E132EC71156", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*", "matchCriteriaId": "8218E2D3-4F1E-440F-A2B2-A68D4692BB17", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*", "matchCriteriaId": "6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*", "matchCriteriaId": "E2E3044F-3CE8-4970-9A7F-FDF555F622A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*", "matchCriteriaId": "1018E04C-5575-4D1A-B482-D1CDB9AD6A50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*", "matchCriteriaId": "86B9E611-3F06-424C-96EF-EE4997C70AB9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "04472ED2-EB97-47E1-938E-D69C363E81C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "10988AA9-A807-4E70-8197-6F9EFC13AE86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8951276-CDEF-4F54-93DF-B96DB10E6530", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5A594C2-98BB-4AC5-9CC5-89FE97D63323", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B35325A-98F6-41DF-ADD8-91ED992A3ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0B06C5B-73C2-47F1-9ED6-B59F9C1C5AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9758019-F6EA-4552-B070-5A9EBE73BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E75DB3F4-94A8-4341-9C01-1F0DC25A3402", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ons_15454e_optical_transport_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "9442E2B1-6D21-46FC-9782-CD441254EEFB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption)." }, { "lang": "es", "value": "Cisco Internetwork Operating System (IOS) 12.0S a 12.3T intenta procesar operaciones SNMP solicitadas en puertos inapropiados (UDP 162 y un puerto UDP escogido aleatoriamente), lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (recarga del dispositivo y corrupci\u00f3n de memoria)" } ], "id": "CVE-2004-0714", "lastModified": "2024-11-20T23:49:14.063", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-07-27T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/162451" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10186" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA04-111B.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15921" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/162451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA04-111B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15921" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5845" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }