cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2006-1670,https://securityvulnerability.io/vulnerability/CVE-2006-1670,,"Control cards for Cisco Optical Networking System (ONS) 15000 series nodes before 20060405 allow remote attackers to cause a denial of service (memory exhaustion and possibly card reset) by sending an invalid response when the final ACK is expected, aka bug ID CSCei45910.",Cisco,"Ons 15454 Mspp,Ons 15454 Mstp,Ons 15600,Ons 15310-cl Series,Optical Networking Systems Software",,,0.03658000007271767,false,,false,false,false,,,false,false,,2006-04-07T10:00:00.000Z,0 CVE-2004-1434,https://securityvulnerability.io/vulnerability/CVE-2004-1434,,"Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.1(0) to 4.1(2), 4.5(x), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed SNMP packets.",Cisco,Optical Networking Systems Software,,,0.023479999974370003,false,,false,false,false,,,false,false,,2004-12-31T05:00:00.000Z,0 CVE-2004-1435,https://securityvulnerability.io/vulnerability/CVE-2004-1435,,"Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via a large number of TCP connections with an invalid response instead of the final ACK (TCP-ACK).",Cisco,Optical Networking Systems Software,,,0.018230000510811806,false,,false,false,false,,,false,false,,2004-12-31T05:00:00.000Z,0 CVE-2004-1436,https://securityvulnerability.io/vulnerability/CVE-2004-1436,,"The Transaction Language 1 (TL1) login interface in Cisco ONS 15327 4.6(0) and 4.6(1) and 15454 and 15454 SDH 4.6(0) and 4.6(1), when a user account is configured with a blank password, allows remote attackers to gain unauthorized access by logging in with a password larger than 10 characters.",Cisco,Optical Networking Systems Software,,,0.013530000112950802,false,,false,false,false,,,false,false,,2004-12-31T05:00:00.000Z,0 CVE-2004-1432,https://securityvulnerability.io/vulnerability/CVE-2004-1432,,"Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed (1) IP or (2) ICMP packets.",Cisco,Optical Networking Systems Software,,,0.030160000547766685,false,,false,false,false,,,false,false,,2004-12-31T05:00:00.000Z,0 CVE-2004-1433,https://securityvulnerability.io/vulnerability/CVE-2004-1433,,"Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, and ONS 15600 1.x(x), allows remote attackers to cause a denial of service (control card reset) via malformed (1) TCP and (2) UDP packets.",Cisco,Optical Networking Systems Software,,,0.030160000547766685,false,,false,false,false,,,false,false,,2004-12-31T05:00:00.000Z,0 CVE-2004-0308,https://securityvulnerability.io/vulnerability/CVE-2004-0308,,"Unknown vulnerability in Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS15600 before 1.3(0) allows a superuser whose account is locked out, disabled, or suspended to gain unauthorized access via a Telnet connection to the VxWorks shell.",Cisco,Optical Networking Systems Software,,,0.003719999920576811,false,,false,false,false,,,false,false,,2004-11-24T05:00:00.000Z,0 CVE-2004-0307,https://securityvulnerability.io/vulnerability/CVE-2004-0307,,"Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), and ONS 15454 SD before 4.1(3) allows remote attackers to cause a denial of service (reset) by not sending the ACK portion of the TCP three-way handshake and sending an invalid response instead.",Cisco,Optical Networking Systems Software,,,0.006490000057965517,false,,false,false,false,,,false,false,,2004-11-23T05:00:00.000Z,0 CVE-2004-0306,https://securityvulnerability.io/vulnerability/CVE-2004-0306,,"Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS 15600 before 1.3(0) enable TFTP service on UDP port 69 by default, which allows remote attackers to GET or PUT ONS system files on the current active TCC in the /flash0 or /flash1 directories.",Cisco,Optical Networking Systems Software,,,0.003379999892786145,false,,false,false,false,,,false,false,,2004-11-23T05:00:00.000Z,0 CVE-2002-1558,https://securityvulnerability.io/vulnerability/CVE-2002-1558,,"Cisco ONS15454 and ONS15327 running ONS before 3.4 have an account for the VxWorks Operating System in the TCC, TCC+ and XTC that cannot be changed or disabled, which allows remote attackers to gain privileges by connecting to the account via Telnet.",Cisco,Optical Networking Systems Software,,,0.005470000207424164,false,,false,false,false,,,false,false,,2003-03-31T05:00:00.000Z,0 CVE-2002-1554,https://securityvulnerability.io/vulnerability/CVE-2002-1554,,"Cisco ONS15454 and ONS15327 running ONS before 3.4 stores usernames and passwords in cleartext in the image database for the TCC, TCC+ or XTC, which could allow attackers to gain privileges by obtaining the passwords from the image database or a backup.",Cisco,Optical Networking Systems Software,,,0.0005000000237487257,false,,false,false,false,,,false,false,,2003-03-31T05:00:00.000Z,0 CVE-2002-1555,https://securityvulnerability.io/vulnerability/CVE-2002-1555,,"Cisco ONS15454 and ONS15327 running ONS before 3.4 uses a ""public"" SNMP community string that cannot be changed, which allows remote attackers to obtain sensitive information.",Cisco,Optical Networking Systems Software,,,0.002400000113993883,false,,false,false,false,,,false,false,,2003-03-31T05:00:00.000Z,0 CVE-2002-1556,https://securityvulnerability.io/vulnerability/CVE-2002-1556,,"Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset) via an HTTP request to the TCC, TCC+ or XTC, in which the request contains an invalid CORBA Interoperable Object Reference (IOR).",Cisco,Optical Networking Systems Software,,,0.002090000081807375,false,,false,false,false,,,false,false,,2003-03-31T05:00:00.000Z,0 CVE-2002-1553,https://securityvulnerability.io/vulnerability/CVE-2002-1553,,"Cisco ONS15454 and ONS15327 running ONS before 3.4 allows remote attackers to modify the system configuration and delete files by establishing an FTP connection to the TCC, TCC+ or XTC using a username and password that does not exist.",Cisco,Optical Networking Systems Software,,,0.005470000207424164,false,,false,false,false,,,false,false,,2003-03-31T05:00:00.000Z,0 CVE-2002-1557,https://securityvulnerability.io/vulnerability/CVE-2002-1557,,"Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset to TCC, TCC+, TCCi or XTC) via a malformed HTTP request that does not contain a leading / (slash) character.",Cisco,Optical Networking Systems Software,,,0.002090000081807375,false,,false,false,false,,,false,false,,2003-03-31T05:00:00.000Z,0 CVE-2002-0952,https://securityvulnerability.io/vulnerability/CVE-2002-0952,,Cisco ONS15454 optical transport platform running ONS 3.1.0 to 3.2.0 allows remote attackers to cause a denial of service (reset) by sending IP packets with non-zero Type of Service (TOS) bits to the Timing Control Card (TCC) LAN interface.,Cisco,Optical Networking Systems Software,,,0.005969999823719263,false,,false,false,false,,,false,false,,2002-10-04T04:00:00.000Z,0