Page 16 of 107 results (0.011 seconds)

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

Cisco IOS XE 3.5E and earlier on WS-C3850, WS-C3860, and AIR-CT5760 devices does not properly parse the "request system shell" challenge response, which allows local users to obtain Linux root access by leveraging administrative privilege, aka Bug ID CSCur09815. Cisco IOS XE 3.5E y anteriores en los dispositivos WS-C3850, WS-C3860, y AIR-CT5760 no analiza debidamente la respuesta al reto 'solicitar el shell del sistema', lo que permite a usuarios locales obtener acceso al root de Linux mediante el aprovechamiento de privilegios administrativos, también conocido como Bug ID CSCur09815. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7990 http://tools.cisco.com/security/center/viewAlert.x?alertId=36351 http://www.securityfocus.com/bid/70968 http://www.securitytracker.com/id/1031179 https://exchange.xforce.ibmcloud.com/vulnerabilities/98529 • CWE-20: Improper Input Validation •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

The Ethernet Connectivity Fault Management (CFM) handling feature in Cisco IOS 12.2(33)SRE9a and earlier and IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (device reload) via malformed CFM packets, aka Bug ID CSCuq93406. La caracteristica del manejador Ethernet Connectivity Fault Management (CFM) en Cisco IOS 12.2(33)SRE9a y anteriores e IOS XE 3.13S y anteriores permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) a través de paquetes CFM malformados, también conocido como Bug ID CSCuq93406. • http://secunia.com/advisories/61799 http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3409 http://tools.cisco.com/security/center/viewAlert.x?alertId=36184 http://www.securityfocus.com/bid/70715 http://www.securitytracker.com/id/1031119 https://exchange.xforce.ibmcloud.com/vulnerabilities/97758 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 1%CPEs: 46EXPL: 0

Cisco IOS 12.4 and 15.0 through 15.4 and IOS XE 3.1.xS, 3.2.xS, 3.3.xS, 3.4.xS, 3.5.xS, 3.6.xS, and 3.7.xS before 3.7.6S; 3.8.xS, 3.9.xS, and 3.10.xS before 3.10.1S; and 3.11.xS before 3.12S allow remote attackers to cause a denial of service (device reload) via a crafted SIP message, aka Bug ID CSCul46586. Cisco IOS 12.4 y 15.0 hasta 15.4 y IOS XE 3.1.xS, 3.2.xS, 3.3.xS, 3.4.xS, 3.5.xS, 3.6.xS, y 3.7.xS anterior a 3.7.6S; 3.8.xS, 3.9.xS, y 3.10.xS anterior a 3.10.1S; y 3.11.xS anterior a 3.12S permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) a través de un mensaje SIP manipulado, también conocido como Bug ID CSCul46586. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-sip http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-sip/cvrf/cisco-sa-20140924-sip_cvrf.xml http://www.securityfocus.com/bid/70141 http://www.securitytracker.com/id/1030897 https://exchange.xforce.ibmcloud.com/vulnerabilities/96174 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 2%CPEs: 131EXPL: 0

Cisco IOS 12.0, 12.2, 12.4, 15.0, 15.1, 15.2, and 15.3 and IOS XE 2.x and 3.x before 3.7.4S; 3.2.xSE and 3.3.xSE before 3.3.2SE; 3.3.xSG and 3.4.xSG before 3.4.4SG; and 3.8.xS, 3.9.xS, and 3.10.xS before 3.10.1S allow remote attackers to cause a denial of service (device reload) via malformed RSVP packets, aka Bug ID CSCui11547. Cisco IOS 12.0, 12.2, 12.4, 15.0, 15.1, 15.2, y 15.3 y IOS XE 2.x y 3.x anterior a 3.7.4S; 3.2.xSE y 3.3.xSE anterior a 3.3.2SE; 3.3.xSG y 3.4.xSG anterior a 3.4.4SG; y 3.8.xS, 3.9.xS, y 3.10.xS anterior a 3.10.1S permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) a través de mensajes RSVP malformados, también conocido como Bug ID CSCui11547. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-rsvp http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-rsvp/cvrf/cisco-sa-20140924-rsvp_cvrf.xml http://www.securityfocus.com/bid/70131 http://www.securityfocus.com/bid/70183 http://www.securitytracker.com/id/1030893 https://exchange.xforce.ibmcloud.com/vulnerabilities/96178 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 17EXPL: 0

The EnergyWise module in Cisco IOS 12.2, 15.0, 15.1, 15.2, and 15.4 and IOS XE 3.2.xXO, 3.3.xSG, 3.4.xSG, and 3.5.xE before 3.5.3E allows remote attackers to cause a denial of service (device reload) via a crafted IPv4 packet, aka Bug ID CSCup52101. El módulo EnergyWise en Cisco IOS 12.2, 15.0, 15.1, 15.2 y 15.4 y IOS XE 3.2.xXO, 3.3.xSG, 3.4.xSG y 3.5.xE anterior a 3.5.3E permite a atacantes remotos causar una denegación de servicio (reinicio de dispositivo) a través de un paquete IPv4 manipulado, también conocido como Bug ID CSCup52101. • http://secunia.com/advisories/60650 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140806-energywise http://www.securityfocus.com/bid/69066 http://www.securitytracker.com/id/1030682 https://exchange.xforce.ibmcloud.com/vulnerabilities/95137 • CWE-20: Improper Input Validation •