Cisco Optical Networking Systems Software (ONS) 2.3(5)

CPE Details

Cisco Optical Networking Systems Software (ONS) 2.3(5)
2.3\(5\)
2010-12-28
16h30 +00:00
2010-12-28
16h30 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:cisco:optical_networking_systems_software:2.3\(5\):*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

optical_networking_systems_software

Version

2.3\(5\)

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2004-1432 2005-02-13 04h00 +00:00 Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed (1) IP or (2) ICMP packets.
5
CVE-2004-1433 2005-02-13 04h00 +00:00 Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, and ONS 15600 1.x(x), allows remote attackers to cause a denial of service (control card reset) via malformed (1) TCP and (2) UDP packets.
5
CVE-2004-1434 2005-02-13 04h00 +00:00 Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.1(0) to 4.1(2), 4.5(x), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed SNMP packets.
5
CVE-2004-1435 2005-02-13 04h00 +00:00 Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via a large number of TCP connections with an invalid response instead of the final ACK (TCP-ACK).
5
CVE-2004-1436 2005-02-13 04h00 +00:00 The Transaction Language 1 (TL1) login interface in Cisco ONS 15327 4.6(0) and 4.6(1) and 15454 and 15454 SDH 4.6(0) and 4.6(1), when a user account is configured with a blank password, allows remote attackers to gain unauthorized access by logging in with a password larger than 10 characters.
7.5