
CVE-2023-44487 – HTTP/2 Rapid Reset Attack Vulnerability
https://notcve.org/view.php?id=CVE-2023-44487
10 Oct 2023 — The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. El protocolo HTTP/2 permite una denegación de servicio (consumo de recursos del servidor) porque la cancelación de solicitudes puede restablecer muchas transmisiones rápidamente, como se explotó en la naturaleza entre agosto y octubre de 2023. A flaw was found in handling multiplexed streams in the HTTP/2 protocol. ... • https://github.com/imabee101/CVE-2023-44487 • CWE-400: Uncontrolled Resource Consumption •

CVE-2015-0651
https://notcve.org/view.php?id=CVE-2015-0651
27 Feb 2015 — Cross-site request forgery (CSRF) vulnerability in the web GUI in Cisco Application Networking Manager (ANM), and Device Manager (DM) on Cisco 4710 Application Control Engine (ACE) appliances, allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuo99753. Vulnerabilidad de CSRF en la interfaz gráfica del usuario web en Cisco Application Networking Manager (ANM), y Device Manager (DM) en los dispositivos Cisco 4710 Application Control Engine (ACE), permite a atacantes remotos... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0651 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2013-1196
https://notcve.org/view.php?id=CVE-2013-1196
29 Apr 2013 — The command-line interface in Cisco Secure Access Control System (ACS), Identity Services Engine Software, Context Directory Agent, Application Networking Manager (ANM), Prime Network Control System, Prime LAN Management Solution (LMS), Prime Collaboration, Unified Provisioning Manager, Network Services Manager, Prime Data Center Network Manager (DCNM), and Quad does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCug29384, CSCug13866, C... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1196 • CWE-20: Improper Input Validation •

CVE-2013-1125
https://notcve.org/view.php?id=CVE-2013-1125
19 Feb 2013 — The command-line interface in Cisco Identity Services Engine Software, Secure Access Control System (ACS), Application Networking Manager (ANM), Prime LAN Management Solution (LMS), Prime Network Control System, Quad, Context Directory Agent, Prime Collaboration, Unified Provisioning Manager, and Network Services Manager does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCue46001, CSCud95790, CSCue46021, CSCue46025, CSCue46023, CSCue46... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1125 • CWE-20: Improper Input Validation •

CVE-2009-0615
https://notcve.org/view.php?id=CVE-2009-0615
26 Feb 2009 — Directory traversal vulnerability in Cisco Application Networking Manager (ANM) before 2.0 and Application Control Engine (ACE) Device Manager before A3(2.1) allows remote authenticated users to read or modify arbitrary files via unspecified vectors, related to "invalid directory permissions." Vulnerabilidad de salto de directorio en Cisco Application Networking Manager (ANM) anterior a v2.0 y Application Control Engine (ACE) Device Manager anterior a vA3(2.1) permite a usuarios atenticados remotamente leer... • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2009-0616
https://notcve.org/view.php?id=CVE-2009-0616
26 Feb 2009 — Cisco Application Networking Manager (ANM) before 2.0 uses default usernames and passwords, which makes it easier for remote attackers to access the application, or cause a denial of service via configuration changes, related to "default user credentials during installation." Cisco Application Networking Manager (ANM) en versiones anteriores a la 2.0 utiliza nombres de usuario y contraseñas por defecto, lo que facilita el acceso a los atacantes remotos a la aplicacion, o causar una denegación de servicio a ... • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml • CWE-255: Credentials Management Errors •

CVE-2009-0617
https://notcve.org/view.php?id=CVE-2009-0617
26 Feb 2009 — Cisco Application Networking Manager (ANM) before 2.0 uses a default MySQL root password, which makes it easier for remote attackers to execute arbitrary operating-system commands or change system files. Cisco Application Networking Manager (ANM) anteriores a v2.0 utiliza una contraseña por defecto para el directorio raíz MySQL, el cual hace más fácil para atacantes remotos ejecutar arbitrariamente comandos del sistema operativo o cambiar archivos del sistema. • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml • CWE-255: Credentials Management Errors •

CVE-2009-0618
https://notcve.org/view.php?id=CVE-2009-0618
26 Feb 2009 — Unspecified vulnerability in the Java agent in Cisco Application Networking Manager (ANM) before 2.0 Update A allows remote attackers to gain privileges, and cause a denial of service (service outage) by stopping processes, or obtain sensitive information by reading configuration files. Vulnerabilidad no especificada en el agente Java de Cisco Application Networking Manager (ANM) anterior a 2.0 Actualización A, permite a atacantes remotos obtener privilegios y provocar una denegación de servicio -parada del... • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml •

CVE-2005-4794
https://notcve.org/view.php?id=CVE-2005-4794
31 Dec 2005 — Cisco IP Phones 7902/7905/7912, ATA 186/188, Unity Express, ACNS, and Subscriber Edge Services Manager (SESM) allows remote attackers to cause a denial of service (crash or instability) via a compressed DNS packet with a label length byte with an incorrect offset. • http://secunia.com/advisories/15472 •

CVE-2005-0598
https://notcve.org/view.php?id=CVE-2005-0598
24 Feb 2005 — The RealServer RealSubscriber on Cisco devices running Application and Content Networking System (ACNS) 5.1 allow remote attackers to cause a denial of service (CPU consumption) via malformed packets. • http://secunia.com/advisories/14395 •