Search criteria

7 vulnerabilities found for omniswitch by alcatel

VAR-201506-0116

Vulnerability from variot - Updated: 2025-04-13 23:39

Cross-site request forgery (CSRF) vulnerability in sec/content/sec_asa_users_local_db_add.html in the management web interface in Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, 6855, 6900, 10K, and 6860 with firmware 6.4.5.R02, 6.4.6.R01, 6.6.4.R01, 6.6.5.R02, 7.3.2.R01, 7.3.3.R01, 7.3.4.R01, and 8.1.1.R01 allows remote attackers to hijack the authentication of administrators for requests that create users via a crafted request. Alcatel OmniSwitch is an enterprise-class switch. Multiple Alcatel-Lucent OmniSwitch products are prone to a cross-site request-forgery vulnerability. An attacker can exploit this issue to perform unauthorized actions in the context of a logged-in user of the affected application. This may aid in other attacks. Alcatel-Lucent OmniSwitch 6450, etc. are switches products of Alcatel-Lucent (Alcatel-Lucent) in France. The following products and versions are affected: using version 6.4.5.R02, version 6.4.6.R01, version 6.6.4.R01, version 6.6.5.R02, version 7.3.2.R01, version 7.3.3.R01, Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, 6855, 6900, 10K, 6860 with firmware 7.3.4.R01 and 8.1.1.R01

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201506-0116",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 1.4,
        "vendor": "alcatel lucent",
        "version": "6.4.5.r02"
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 1.4,
        "vendor": "alcatel lucent",
        "version": "6.4.6.r01"
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 1.4,
        "vendor": "alcatel lucent",
        "version": "6.6.4.r01"
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 1.4,
        "vendor": "alcatel lucent",
        "version": "6.6.5.r02"
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 1.4,
        "vendor": "alcatel lucent",
        "version": "7.3.2.r01"
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 1.4,
        "vendor": "alcatel lucent",
        "version": "7.3.3.r01"
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 1.4,
        "vendor": "alcatel lucent",
        "version": "7.3.4.r01"
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 1.4,
        "vendor": "alcatel lucent",
        "version": "8.1.1.r01"
      },
      {
        "model": "omniswitch",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "alcatel lucent",
        "version": "7.3.3.r01"
      },
      {
        "model": "omniswitch",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "alcatel lucent",
        "version": "8.1.1.r01"
      },
      {
        "model": "omniswitch",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "alcatel lucent",
        "version": "7.3.4.r01"
      },
      {
        "model": "omniswitch",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "alcatel lucent",
        "version": "6.4.5.r02"
      },
      {
        "model": "omniswitch",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "alcatel lucent",
        "version": "6.6.4.r01"
      },
      {
        "model": "omniswitch",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "alcatel lucent",
        "version": "7.3.2.r01"
      },
      {
        "model": "omniswitch",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "alcatel lucent",
        "version": "6.6.5.r02"
      },
      {
        "model": "omniswitch",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "alcatel lucent",
        "version": "6.4.6.r01"
      },
      {
        "model": "omniswitch 10k",
        "scope": null,
        "trust": 0.8,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 6250",
        "scope": null,
        "trust": 0.8,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 6400",
        "scope": null,
        "trust": 0.8,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 6450",
        "scope": null,
        "trust": 0.8,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 6850e",
        "scope": null,
        "trust": 0.8,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 6855",
        "scope": null,
        "trust": 0.8,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 6860",
        "scope": null,
        "trust": 0.8,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 6900",
        "scope": null,
        "trust": 0.8,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 9000e",
        "scope": null,
        "trust": 0.8,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "alcatel",
        "version": "6860"
      },
      {
        "model": "omniswitch 10k",
        "scope": null,
        "trust": 0.6,
        "vendor": "alcatel",
        "version": null
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "alcatel",
        "version": "6900"
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "alcatel",
        "version": "6855"
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "alcatel",
        "version": "6400"
      },
      {
        "model": "omniswitch 9000e",
        "scope": null,
        "trust": 0.6,
        "vendor": "alcatel",
        "version": null
      },
      {
        "model": "omniswitch 6850e",
        "scope": null,
        "trust": 0.6,
        "vendor": "alcatel",
        "version": null
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "alcatel",
        "version": "6250"
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "alcatel",
        "version": "6450"
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "alcatel",
        "version": "7700"
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "alcatel",
        "version": "7800"
      },
      {
        "model": "omniswitch 9000e 8.1.1.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 9000e 7.3.4.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 9000e 7.3.3.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 9000e 7.3.2.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 9000e 6.6.5.r02",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 9000e 6.6.4.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 9000e 6.4.6.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 9000e 6.4.5.r02",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 8.1.1.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6900"
      },
      {
        "model": "omniswitch 7.3.4.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6900"
      },
      {
        "model": "omniswitch 7.3.3.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6900"
      },
      {
        "model": "omniswitch 7.3.2.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6900"
      },
      {
        "model": "omniswitch 6.6.5.r02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6900"
      },
      {
        "model": "omniswitch 6.6.4.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6900"
      },
      {
        "model": "omniswitch 6.4.6.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6900"
      },
      {
        "model": "omniswitch 6.4.5.r02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6900"
      },
      {
        "model": "omniswitch 8.1.1.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6860"
      },
      {
        "model": "omniswitch 7.3.4.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6860"
      },
      {
        "model": "omniswitch 7.3.3.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6860"
      },
      {
        "model": "omniswitch 7.3.2.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6860"
      },
      {
        "model": "omniswitch 6.6.5.r02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6860"
      },
      {
        "model": "omniswitch 6.6.4.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6860"
      },
      {
        "model": "omniswitch 6.4.6.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6860"
      },
      {
        "model": "omniswitch 6.4.5.r02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6860"
      },
      {
        "model": "omniswitch 8.1.1.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6855"
      },
      {
        "model": "omniswitch 7.3.4.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6855"
      },
      {
        "model": "omniswitch 7.3.3.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6855"
      },
      {
        "model": "omniswitch 7.3.2.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6855"
      },
      {
        "model": "omniswitch 6.6.5.r02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6855"
      },
      {
        "model": "omniswitch 6.6.4.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6855"
      },
      {
        "model": "omniswitch 6.4.6.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6855"
      },
      {
        "model": "omniswitch 6.4.5.r02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6855"
      },
      {
        "model": "omniswitch 6850e 8.1.1.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 6850e 7.3.4.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 6850e 7.3.3.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 6850e 7.3.2.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 6850e 6.6.5.r02",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 6850e 6.6.4.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 6850e 6.4.6.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 6850e 6.4.5.r02",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 8.1.1.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6450"
      },
      {
        "model": "omniswitch 7.3.4.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6450"
      },
      {
        "model": "omniswitch 7.3.3.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6450"
      },
      {
        "model": "omniswitch 7.3.2.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6450"
      },
      {
        "model": "omniswitch 6.6.5.r02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6450"
      },
      {
        "model": "omniswitch 6.6.4.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6450"
      },
      {
        "model": "omniswitch 6.4.6.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6450"
      },
      {
        "model": "omniswitch 6.4.5.r02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6450"
      },
      {
        "model": "omniswitch 8.1.1.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6400"
      },
      {
        "model": "omniswitch 7.3.4.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6400"
      },
      {
        "model": "omniswitch 7.3.3.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6400"
      },
      {
        "model": "omniswitch 7.3.2.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6400"
      },
      {
        "model": "omniswitch 6.6.5.r02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6400"
      },
      {
        "model": "omniswitch 6.6.4.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6400"
      },
      {
        "model": "omniswitch 6.4.6.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6400"
      },
      {
        "model": "omniswitch 6.4.5.r02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6400"
      },
      {
        "model": "omniswitch 8.1.1.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6250"
      },
      {
        "model": "omniswitch 7.3.4.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6250"
      },
      {
        "model": "omniswitch 7.3.3.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6250"
      },
      {
        "model": "omniswitch 7.3.2.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6250"
      },
      {
        "model": "omniswitch 6.6.5.r02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6250"
      },
      {
        "model": "omniswitch 6.6.4.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6250"
      },
      {
        "model": "omniswitch 6.4.6.r01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6250"
      },
      {
        "model": "omniswitch 6.4.5.r02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "6250"
      },
      {
        "model": "omniswitch 10k 8.1.1.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 10k 7.3.4.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 10k 7.3.3.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 10k 7.3.2.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 10k 6.6.5.r02",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 10k 6.6.4.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 10k 6.4.6.r01",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": "omniswitch 10k 6.4.5.r02",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03785"
      },
      {
        "db": "BID",
        "id": "75121"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-003165"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-297"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2805"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:alcatel-lucent:omniswitch_10k",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:alcatel-lucent:omniswitch_6250",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:alcatel-lucent:omniswitch_6400",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:alcatel-lucent:omniswitch_6450",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:alcatel-lucent:omniswitch_6850e",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:alcatel-lucent:omniswitch_6855",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:alcatel-lucent:omniswitch_6860",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:alcatel-lucent:omniswitch_6900",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:alcatel-lucent:omniswitch_9000e",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:alcatel-lucent:omniswitch_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-003165"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "RedTeam Pentesting GmbH",
    "sources": [
      {
        "db": "BID",
        "id": "75121"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-2805",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2015-2805",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "CNVD-2015-03785",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-80766",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-2805",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2015-2805",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-03785",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201506-297",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-80766",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03785"
      },
      {
        "db": "VULHUB",
        "id": "VHN-80766"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-003165"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-297"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2805"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site request forgery (CSRF) vulnerability in sec/content/sec_asa_users_local_db_add.html in the management web interface in Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, 6855, 6900, 10K, and 6860 with firmware 6.4.5.R02, 6.4.6.R01, 6.6.4.R01, 6.6.5.R02, 7.3.2.R01, 7.3.3.R01, 7.3.4.R01, and 8.1.1.R01 allows remote attackers to hijack the authentication of administrators for requests that create users via a crafted request. Alcatel OmniSwitch is an enterprise-class switch. Multiple Alcatel-Lucent OmniSwitch products are prone to a cross-site request-forgery vulnerability. \nAn attacker can exploit this issue to perform unauthorized actions in the context of a logged-in user of the affected application. This may aid in other attacks. Alcatel-Lucent OmniSwitch 6450, etc. are switches products of Alcatel-Lucent (Alcatel-Lucent) in France. The following products and versions are affected: using version 6.4.5.R02, version 6.4.6.R01, version 6.6.4.R01, version 6.6.5.R02, version 7.3.2.R01, version 7.3.3.R01, Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, 6855, 6900, 10K, 6860 with firmware 7.3.4.R01 and 8.1.1.R01",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-2805"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-003165"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-03785"
      },
      {
        "db": "BID",
        "id": "75121"
      },
      {
        "db": "VULHUB",
        "id": "VHN-80766"
      }
    ],
    "trust": 2.52
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-80766",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-80766"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-2805",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "75121",
        "trust": 2.0
      },
      {
        "db": "PACKETSTORM",
        "id": "132236",
        "trust": 1.7
      },
      {
        "db": "EXPLOIT-DB",
        "id": "37261",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1032544",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-003165",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-297",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-03785",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-80766",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03785"
      },
      {
        "db": "VULHUB",
        "id": "VHN-80766"
      },
      {
        "db": "BID",
        "id": "75121"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-003165"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-297"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2805"
      }
    ]
  },
  "id": "VAR-201506-0116",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03785"
      },
      {
        "db": "VULHUB",
        "id": "VHN-80766"
      }
    ],
    "trust": 1.322222233333333
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03785"
      }
    ]
  },
  "last_update_date": "2025-04-13T23:39:38.448000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.alcatel-lucent.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-003165"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-80766"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-003165"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2805"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "https://www.redteam-pentesting.de/advisories/rt-sa-2015-004"
      },
      {
        "trust": 1.7,
        "url": "https://www.exploit-db.com/exploits/37261/"
      },
      {
        "trust": 1.7,
        "url": "http://seclists.org/fulldisclosure/2015/jun/23"
      },
      {
        "trust": 1.7,
        "url": "http://packetstormsecurity.com/files/132236/alcatel-lucent-omniswitch-web-interface-cross-site-request-forgery.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1032544"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/75121"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/535732/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2015-004/-alcatel-lucent-omniswitch-web-interface-cross-site-request-forgery"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2805"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-2805"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/535732/100/0/threaded"
      },
      {
        "trust": 0.3,
        "url": "http://enterprise.alcatel-lucent.com/?product=omniswitch6450\u0026page=overview"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03785"
      },
      {
        "db": "VULHUB",
        "id": "VHN-80766"
      },
      {
        "db": "BID",
        "id": "75121"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-003165"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-297"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2805"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03785"
      },
      {
        "db": "VULHUB",
        "id": "VHN-80766"
      },
      {
        "db": "BID",
        "id": "75121"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-003165"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-297"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2805"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-06-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-03785"
      },
      {
        "date": "2015-06-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-80766"
      },
      {
        "date": "2015-06-10T00:00:00",
        "db": "BID",
        "id": "75121"
      },
      {
        "date": "2015-06-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-003165"
      },
      {
        "date": "2015-06-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201506-297"
      },
      {
        "date": "2015-06-16T16:59:01.113000",
        "db": "NVD",
        "id": "CVE-2015-2805"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-06-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-03785"
      },
      {
        "date": "2018-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-80766"
      },
      {
        "date": "2015-06-10T00:00:00",
        "db": "BID",
        "id": "75121"
      },
      {
        "date": "2015-06-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-003165"
      },
      {
        "date": "2015-06-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201506-297"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2015-2805"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-297"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Alcatel-Lucent OmniSwitch Firmware management  Web Cross-site request forgery vulnerability in the interface",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-003165"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cross-site request forgery",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-297"
      }
    ],
    "trust": 0.6
  }
}

VAR-200412-0377

Vulnerability from variot - Updated: 2025-04-03 22:37

Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled. Alcatel Omniswitch is a high-performance switch.

The OmniSwitch 7000 series switch system has problems processing some types of network communications. Remote attackers can use this vulnerability to conduct denial of service attacks on the switch.

When using Nessus for security scanning, it was found that the OmniSwitch 7000 series switches would be restarted, causing a denial of service. The problem is in the handling of scans by third-party security software. It has been reported that as a result of such scans, the switch reportedly reboots, impacting performance

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200412-0377",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "alcatel",
        "version": "7000"
      },
      {
        "model": "omniswitch 7800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "alcatel",
        "version": "*"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.6,
        "vendor": "none",
        "version": null
      },
      {
        "model": "omniswitch 7800",
        "scope": null,
        "trust": 0.6,
        "vendor": "alcatel",
        "version": null
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "78000"
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alcatel lucent",
        "version": "77000"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2004-0571"
      },
      {
        "db": "BID",
        "id": "9745"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-127"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2377"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Michael Shekman\u203b michaels80@ci.manchester.ct.us",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-127"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2004-2377",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2004-2377",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-10805",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2004-2377",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200412-127",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-10805",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10805"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-127"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2377"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled. Alcatel Omniswitch is a high-performance switch. \n\n\u00a0The OmniSwitch 7000 series switch system has problems processing some types of network communications. Remote attackers can use this vulnerability to conduct denial of service attacks on the switch. \n\n\u00a0When using Nessus for security scanning, it was found that the OmniSwitch 7000 series switches would be restarted, causing a denial of service. \nThe problem is in the handling of scans by third-party security software. It has been reported that as a result of such scans, the switch reportedly reboots, impacting performance",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-2377"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2004-0571"
      },
      {
        "db": "BID",
        "id": "9745"
      },
      {
        "db": "VULHUB",
        "id": "VHN-10805"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2004-2377",
        "trust": 2.3
      },
      {
        "db": "BID",
        "id": "9745",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "10981",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1009211",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "4064",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-127",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2004-0571",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "15318",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "6098",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20040219 ALCATEL OMNISWITCH 7000 SERIES",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-10805",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2004-0571"
      },
      {
        "db": "VULHUB",
        "id": "VHN-10805"
      },
      {
        "db": "BID",
        "id": "9745"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-127"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2377"
      }
    ]
  },
  "id": "VAR-200412-0377",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10805"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T22:37:33.449000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-2377"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/9745"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/archive/1/355134"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/4064"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1009211"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/10981"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/15318"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/6098"
      },
      {
        "trust": 0.3,
        "url": "http://www.ind.alcatel.com/products/index.cfm?cnt=omniswitch_7000"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/355134"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10805"
      },
      {
        "db": "BID",
        "id": "9745"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-127"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2377"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2004-0571"
      },
      {
        "db": "VULHUB",
        "id": "VHN-10805"
      },
      {
        "db": "BID",
        "id": "9745"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-127"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2377"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-02-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2004-0571"
      },
      {
        "date": "2004-12-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-10805"
      },
      {
        "date": "2004-02-25T00:00:00",
        "db": "BID",
        "id": "9745"
      },
      {
        "date": "2004-02-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200412-127"
      },
      {
        "date": "2004-12-31T05:00:00",
        "db": "NVD",
        "id": "CVE-2004-2377"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-02-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2004-0571"
      },
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-10805"
      },
      {
        "date": "2004-02-25T00:00:00",
        "db": "BID",
        "id": "9745"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200412-127"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2004-2377"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-127"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Alcatel OmniSwitch 7000 Series Security Scan Denial of Service Attack Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2004-0571"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-127"
      }
    ],
    "trust": 1.2
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-127"
      }
    ],
    "trust": 0.6
  }
}

VAR-199903-0049

Vulnerability from variot - Updated: 2025-04-03 22:35

Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time. Omniswitch is prone to a security bypass vulnerability. Xylan OmniSwitch prior to 3.2.6 is vulnerable

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-199903-0049",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "omniswitch",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "alcatel",
        "version": "3.2.4"
      },
      {
        "model": "omniswitch",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "alcatel",
        "version": "3.2.4"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "87962"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-199903-052"
      },
      {
        "db": "NVD",
        "id": "CVE-1999-1559"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "87962"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-1999-1559",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-1999-1559",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-1540",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-1999-1559",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-199903-052",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-1540",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-1540"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-199903-052"
      },
      {
        "db": "NVD",
        "id": "CVE-1999-1559"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time. Omniswitch is prone to a security bypass vulnerability. Xylan OmniSwitch prior to 3.2.6 is vulnerable",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-1999-1559"
      },
      {
        "db": "BID",
        "id": "87962"
      },
      {
        "db": "VULHUB",
        "id": "VHN-1540"
      }
    ],
    "trust": 1.26
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-1999-1559",
        "trust": 2.0
      },
      {
        "db": "XF",
        "id": "2064",
        "trust": 0.9
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-199903-052",
        "trust": 0.7
      },
      {
        "db": "BUGTRAQ",
        "id": "19990331 XYLAN OMNISWITCH \"FEATURES\"",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "87962",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-1540",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-1540"
      },
      {
        "db": "BID",
        "id": "87962"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-199903-052"
      },
      {
        "db": "NVD",
        "id": "CVE-1999-1559"
      }
    ]
  },
  "id": "VAR-199903-0049",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-1540"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T22:35:11.205000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-1999-1559"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
      },
      {
        "trust": 0.9,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=92299263017061\u0026w=2"
      },
      {
        "trust": 0.9,
        "url": "http://xforce.iss.net/static/2064.php"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=92299263017061\u0026amp;w=2"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-1540"
      },
      {
        "db": "BID",
        "id": "87962"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-199903-052"
      },
      {
        "db": "NVD",
        "id": "CVE-1999-1559"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-1540"
      },
      {
        "db": "BID",
        "id": "87962"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-199903-052"
      },
      {
        "db": "NVD",
        "id": "CVE-1999-1559"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "1999-03-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-1540"
      },
      {
        "date": "1999-03-31T00:00:00",
        "db": "BID",
        "id": "87962"
      },
      {
        "date": "1999-03-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-199903-052"
      },
      {
        "date": "1999-03-31T05:00:00",
        "db": "NVD",
        "id": "CVE-1999-1559"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-12-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-1540"
      },
      {
        "date": "1999-03-31T00:00:00",
        "db": "BID",
        "id": "87962"
      },
      {
        "date": "2006-09-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-199903-052"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-1999-1559"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-199903-052"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Xylan OmniSwitch Input validation vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-199903-052"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "unknown",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-199903-052"
      }
    ],
    "trust": 0.6
  }
}

CVE-2004-2377 (GCVE-0-2004-2377)

Vulnerability from cvelistv5 – Published: 2005-08-16 04:00 – Updated: 2024-08-08 01:22
VLAI?
Summary
Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/9745 vdb-entryx_refsource_BID
http://secunia.com/advisories/10981 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/4064 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/355134 mailing-listx_refsource_BUGTRAQ
http://securitytracker.com/id?1009211 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:22:13.755Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "alcatel-omniswitch-nessus-dos(15318)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
          },
          {
            "name": "9745",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/9745"
          },
          {
            "name": "10981",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/10981"
          },
          {
            "name": "4064",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/4064"
          },
          {
            "name": "20040219 Alcatel Omniswitch 7000 series",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/355134"
          },
          {
            "name": "1009211",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1009211"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-02-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "alcatel-omniswitch-nessus-dos(15318)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
        },
        {
          "name": "9745",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/9745"
        },
        {
          "name": "10981",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/10981"
        },
        {
          "name": "4064",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/4064"
        },
        {
          "name": "20040219 Alcatel Omniswitch 7000 series",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/355134"
        },
        {
          "name": "1009211",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1009211"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-2377",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "alcatel-omniswitch-nessus-dos(15318)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
            },
            {
              "name": "9745",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/9745"
            },
            {
              "name": "10981",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/10981"
            },
            {
              "name": "4064",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/4064"
            },
            {
              "name": "20040219 Alcatel Omniswitch 7000 series",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/355134"
            },
            {
              "name": "1009211",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1009211"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-2377",
    "datePublished": "2005-08-16T04:00:00",
    "dateReserved": "2005-08-16T00:00:00",
    "dateUpdated": "2024-08-08T01:22:13.755Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-1999-1559 (GCVE-0-1999-1559)

Vulnerability from cvelistv5 – Published: 2001-09-12 04:00 – Updated: 2024-08-01 17:18
VLAI?
Summary
Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T17:18:07.559Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "xylan-omniswitch-login(2064)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
          },
          {
            "name": "19990331 Xylan OmniSwitch \"features\"",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1999-03-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T21:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "xylan-omniswitch-login(2064)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
        },
        {
          "name": "19990331 Xylan OmniSwitch \"features\"",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1559",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "xylan-omniswitch-login(2064)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
            },
            {
              "name": "19990331 Xylan OmniSwitch \"features\"",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1559",
    "datePublished": "2001-09-12T04:00:00",
    "dateReserved": "2001-08-31T00:00:00",
    "dateUpdated": "2024-08-01T17:18:07.559Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-2377 (GCVE-0-2004-2377)

Vulnerability from nvd – Published: 2005-08-16 04:00 – Updated: 2024-08-08 01:22
VLAI?
Summary
Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/9745 vdb-entryx_refsource_BID
http://secunia.com/advisories/10981 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/4064 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/355134 mailing-listx_refsource_BUGTRAQ
http://securitytracker.com/id?1009211 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:22:13.755Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "alcatel-omniswitch-nessus-dos(15318)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
          },
          {
            "name": "9745",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/9745"
          },
          {
            "name": "10981",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/10981"
          },
          {
            "name": "4064",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/4064"
          },
          {
            "name": "20040219 Alcatel Omniswitch 7000 series",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/355134"
          },
          {
            "name": "1009211",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1009211"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-02-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "alcatel-omniswitch-nessus-dos(15318)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
        },
        {
          "name": "9745",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/9745"
        },
        {
          "name": "10981",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/10981"
        },
        {
          "name": "4064",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/4064"
        },
        {
          "name": "20040219 Alcatel Omniswitch 7000 series",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/355134"
        },
        {
          "name": "1009211",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1009211"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-2377",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "alcatel-omniswitch-nessus-dos(15318)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15318"
            },
            {
              "name": "9745",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/9745"
            },
            {
              "name": "10981",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/10981"
            },
            {
              "name": "4064",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/4064"
            },
            {
              "name": "20040219 Alcatel Omniswitch 7000 series",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/355134"
            },
            {
              "name": "1009211",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1009211"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-2377",
    "datePublished": "2005-08-16T04:00:00",
    "dateReserved": "2005-08-16T00:00:00",
    "dateUpdated": "2024-08-08T01:22:13.755Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-1999-1559 (GCVE-0-1999-1559)

Vulnerability from nvd – Published: 2001-09-12 04:00 – Updated: 2024-08-01 17:18
VLAI?
Summary
Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T17:18:07.559Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "xylan-omniswitch-login(2064)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
          },
          {
            "name": "19990331 Xylan OmniSwitch \"features\"",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1999-03-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T21:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "xylan-omniswitch-login(2064)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
        },
        {
          "name": "19990331 Xylan OmniSwitch \"features\"",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1559",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "xylan-omniswitch-login(2064)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2064"
            },
            {
              "name": "19990331 Xylan OmniSwitch \"features\"",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=92299263017061\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1559",
    "datePublished": "2001-09-12T04:00:00",
    "dateReserved": "2001-08-31T00:00:00",
    "dateUpdated": "2024-08-01T17:18:07.559Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}