15 results (0.006 seconds)

CVSS: 7.5EPSS: 83%CPEs: 444EXPL: 7

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. El protocolo HTTP/2 permite una denegación de servicio (consumo de recursos del servidor) porque la cancelación de solicitudes puede restablecer muchas transmisiones rápidamente, como se explotó en la naturaleza entre agosto y octubre de 2023. A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. • https://github.com/imabee101/CVE-2023-44487 https://github.com/studiogangster/CVE-2023-44487 https://github.com/bcdannyboy/CVE-2023-44487 https://github.com/sigridou/CVE-2023-44487- https://github.com/ByteHackr/CVE-2023-44487 https://github.com/ReToCode/golang-CVE-2023-44487 http://www.openwall.com/lists/oss-security/2023/10/13/4 http://www.openwall.com/lists/oss-security/2023/10/13/9 http://www.openwall.com/lists/oss-security/2023/10/18/4 http://www. • CWE-400: Uncontrolled Resource Consumption •

CVSS: 8.3EPSS: 1%CPEs: 39EXPL: 0

The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796. El System Status Collection Daemon (SSCD) de Cisco TelePresence System 500-37, 1000, 1300-65, y 3xxx anterior a la versión 1.10.2(42), y 500-32, 1300-47, TX1310 65, y TX9xxx anterior a la versión 6.0.4(11), permite a atacantes remotos ejecutar comandos arbitrarios para provocar una denegación de servicio (corrupción de memoria de la pila) a través de un mensaje XML-RPC manipulado, también conocido como Bug ID CSCui32796. • http://osvdb.org/102362 http://secunia.com/advisories/56533 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts http://www.securityfocus.com/bid/65071 http://www.securitytracker.com/id/1029656 https://exchange.xforce.ibmcloud.com/vulnerabilities/90624 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 0%CPEs: 84EXPL: 0

Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128. Cisco TelePresence System Software v1.10.1 y anteriores en dispositivos 500, 13X0, 1X00, 30X0, y 3X00, y v6.0.3 y anteriores en dispositivos TX 9X00, tiene una contraseña predeterminada de la cuenta pwrecovery, lo que hace que sea más fácil para los atacantes remotos modificar la configuración o realizar actos arbitrarios a través de peticiones HTTPS, también conocido como Bug ID CSCui43128. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp • CWE-255: Credentials Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 109EXPL: 0

The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338. La implementación IP en Cisco TelePresence Multipoint Switch anterior a v1.8.1, Cisco TelePresence Manager anterior a v1.9.0, y Cisco TelePresence Recording Server v1.8 y anteriores permite a atacantes remotos causar una denegación de servicio mediante (1) un paquete IP mal formado, (2) una elevada cantidad de conexiones TCP, o (3) una elevada cantidad de conexiones de finalización TCP, cambien conocido como bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, y CSCty11338. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman •

CVSS: 8.3EPSS: 0%CPEs: 42EXPL: 0

An unspecified API on Cisco TelePresence Immersive Endpoint Devices before 1.9.1 allows remote attackers to execute arbitrary commands by leveraging certain adjacency and sending a malformed request on TCP port 61460, aka Bug ID CSCtz38382. Una API no especificado en dispositivos Cisco TelePresence Immersive Endpoint anterior a v1.9.1 permite a atacantes remotos ejecutar comandos arbitrarios mediante el envío de una solicitud mal formada al puerto TCP 61460, también conocido como error ID CSCtz38382. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •