Page 13 of 144 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 23EXPL: 0

26 Mar 2015 — The Service Discovery Gateway (aka mDNS Gateway) in Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, and 15.4 and IOS XE 3.9.xS and 3.10.xS before 3.10.4S, 3.11.xS before 3.11.3S, 3.12.xS before 3.12.2S, and 3.13.xS before 3.13.1S allows remote attackers to cause a denial of service (device reload) by sending malformed mDNS UDP packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCup70579. Service Discovery Gateway (también conocido como mDNS Gateway) en Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, y 15.4 y IOS XE... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-mdns • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 41EXPL: 0

26 Mar 2015 — The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to cause a denial of service (device reload) via spoofed AN messages, aka Bug ID CSCup62315. La implemenatción Autonomic Networking Infrastructure (ANI) en Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, y 15.4 y IOS XE 3.10.xS hasta 3.13.xS anterior a 3.13.1S permite a atacantes remotos causar una denegación de servicio (recarga d... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani • CWE-20: Improper Input Validation •

CVSS: 9.1EPSS: 0%CPEs: 43EXPL: 0

26 Mar 2015 — The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to spoof Autonomic Networking Registration Authority (ANRA) responses, and consequently bypass intended device and node access restrictions or cause a denial of service (disrupted domain access), via crafted AN messages, aka Bug ID CSCup62191. La implementación Autonomic Networking Infrastructure (ANI) en Cisco IOS 12.2, 12... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 84EXPL: 0

26 Mar 2015 — Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, and 15.4 and IOS XE 2.5.x, 2.6.x, 3.1.xS through 3.12.xS before 3.12.3S, 3.2.xE through 3.7.xE before 3.7.1E, 3.3.xSG, 3.4.xSG, and 3.13.xS before 3.13.2S allow remote attackers to cause a denial of service (device reload) by sending malformed IKEv2 packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCum36951. Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, y 15.4 y IOS XE 2.5.x, 2.6.x, 3.1.xS hasta 3.12.xS anterior a 3.12.3S, 3.2.xE hasta 3.7.xE anterior a 3.7.1E, 3.... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ikev2 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 29EXPL: 0

26 Mar 2015 — The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to cause a denial of service (disrupted domain access) via spoofed AN messages that reset a finite state machine, aka Bug ID CSCup62293. La implemenatción Autonomic Networking Infrastructure (ANI) en Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, y 15.4 y IOS XE 3.10.xS hasta 3.13.xS anterior a 3.13.1S permite a atacantes remotos ... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 63EXPL: 0

26 Mar 2015 — Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, and 15.4 and IOS XE 2.5.x, 2.6.x, 3.1.xS through 3.12.xS before 3.12.3S, 3.2.xE through 3.7.xE before 3.7.1E, 3.3.xSG, 3.4.xSG, and 3.13.xS before 3.13.2S allow remote attackers to cause a denial of service (memory consumption and device reload) by sending malformed IKEv2 packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCuo75572. Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, y 15.4 y IOS XE 2.5.x, 2.6.x, 3.1.xS hasta 3.12.xS anterior a 3.12.3S, 3.2.xE hasta 3.7.x... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ikev2 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

21 Mar 2015 — The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 15.4S and 15.4(3)S allows remote attackers to modify configuration settings or cause a denial of service (partial service outage) by sending crafted Autonomic Networking (AN) messages on an intranet network, aka Bug ID CSCup62167. La implementación Autonomic Networking Infrastructure (ANI) de Cisco IOS 15.4S y 15.4(3)S permite a atacantes remotos modificar la configuración o causar una denegación de servicio (caída parcial del servici... • http://tools.cisco.com/security/center/viewAlert.x?alertId=37935 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 0%CPEs: 11EXPL: 0

06 Mar 2015 — The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connection attempt with a blank password, aka Bug IDs CSCuo09400 and CSCun16016. La característica Authentication Proxy en Cisco IOS no maneja correctamente los códigos de retorno AAA inválidos de los servidores RADIUS y... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0607 • CWE-287: Improper Authentication •

CVSS: 7.1EPSS: 1%CPEs: 10EXPL: 0

16 Feb 2015 — Race condition in the Common Classification Engine (CCE) in the Measurement, Aggregation, and Correlation Engine (MACE) implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCuj96752. Condición de carrera en Common Classification Engine (CCE) en la implamantación Measurement, Aggregation, and... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0609 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

13 Feb 2015 — The Zone-Based Firewall implementation in Cisco IOS 12.4(122)T and earlier does not properly manage session-object structures, which allows remote attackers to cause a denial of service (device reload) via crafted network traffic, aka Bug ID CSCul65003. La implementación Zone-Based Firewall en Cisco IOS 12.4(122)T y anteriores no maneja correctamente las estructuras de objetos de sesiones, lo que permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) a través de trafico manip... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0593 • CWE-399: Resource Management Errors •