Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Lucent Subscribe
Total 13 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-1999-0221 1 Lucent 1 Ascend Routers 2022-08-17 5.0 MEDIUM N/A
Denial of service of Ascend routers through port 150 (remote administration).
CVE-1999-0060 1 Lucent 3 Ascend Max Router, Ascend Pipeline Router, Ascend Tnt Router 2022-08-16 5.0 MEDIUM N/A
Attackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool.
CVE-2001-1377 11 Freeradius, Gnu, Icradius and 8 more 11 Freeradius, Radius, Icradius and 8 more 2018-10-30 5.0 MEDIUM N/A
Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.
CVE-2001-1376 12 Ascend, Freeradius, Gnu and 9 more 12 Radius, Freeradius, Radius and 9 more 2018-10-30 7.5 HIGH N/A
Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data.
CVE-2001-0618 1 Lucent 1 Orinoco Rg-1000 2017-12-18 7.5 HIGH N/A
Orinoco RG-1000 wireless Residential Gateway uses the last 5 digits of the 'Network Name' or SSID as the default Wired Equivalent Privacy (WEP) encryption key. Since the SSID occurs in the clear during communications, a remote attacker could determine the WEP key and decrypt RG-1000 traffic.
CVE-2002-0236 1 Lucent 5 Vitalanalysis, Vitalevent, Vitalhelp and 2 more 2016-10-17 7.5 HIGH N/A
Lucent VitalSuite 8.0 through 8.2, including VitalNet, VitalEvent, and VitalHelp/VitalAnalysis, allows remote attackers to bypass authentication via a direct HTTP request to the VsSetCookie.exe program, which returns a valid cookie for the desired user.
CVE-2001-0534 2 Lucent, Merit 2 Radius, Radius 2008-09-10 10.0 HIGH N/A
Multiple buffer overflows in RADIUS daemon radiusd in (1) Merit 3.6b and (2) Lucent 2.1-2 RADIUS allow remote attackers to cause a denial of service or execute arbitrary commands.
CVE-2001-0619 1 Lucent 1 Orinoco 2008-09-10 7.5 HIGH N/A
The Lucent Closed Network protocol can allow remote attackers to join Closed Network networks which they do not have access to. The 'Network Name' or SSID, which is used as a shared secret to join the network, is transmitted in the clear.
CVE-2002-2148 1 Lucent 3 Ascend Max Router, Ascend Pipeline Router, Dslterminator 2008-09-05 5.0 MEDIUM N/A
Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response.
CVE-2002-2149 1 Lucent 3 Access Point Service Router 1500, Access Point Service Router 300, Access Point Service Router 600 2008-09-05 5.0 MEDIUM N/A
Buffer overflow in Lucent Access Point 300, 600, and 1500 Service Routers allows remote attackers to cause a denial of service (reboot) via a long HTTP request to the administrative interface.
CVE-2001-1082 2 Lucent, Simon Horms 2 Radius, Radius 2008-09-05 5.0 MEDIUM N/A
Directory traversal vulnerability in Livingston/Lucent RADIUS before 2.1.va.1 may allow attackers to read arbitrary files via a .. (dot dot) attack.
CVE-2001-1081 2 Lucent, Simon Horms 2 Radius, Radius 2008-09-05 7.5 HIGH N/A
Format string vulnerabilities in Livingston/Lucent RADIUS before 2.1.va.1 may allow local or remote attackers to cause a denial of service and possibly execute arbitrary code via format specifiers that are injected into log messages.
CVE-2001-0160 2 Lucent, Orinoco 2 Wavelan, Orinoco Wavelan 2008-09-05 5.0 MEDIUM N/A
Lucent/ORiNOCO WaveLAN cards generate predictable Initialization Vector (IV) values for the Wireless Encryption Protocol (WEP) which allows remote attackers to quickly compile information that will let them decrypt messages.