Page 19 of 525 results (0.004 seconds)

CVSS: 7.8EPSS: 1%CPEs: 63EXPL: 0

26 Mar 2015 — Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, and 15.4 and IOS XE 2.5.x, 2.6.x, 3.1.xS through 3.12.xS before 3.12.3S, 3.2.xE through 3.7.xE before 3.7.1E, 3.3.xSG, 3.4.xSG, and 3.13.xS before 3.13.2S allow remote attackers to cause a denial of service (memory consumption and device reload) by sending malformed IKEv2 packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCuo75572. Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, y 15.4 y IOS XE 2.5.x, 2.6.x, 3.1.xS hasta 3.12.xS anterior a 3.12.3S, 3.2.xE hasta 3.7.x... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ikev2 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 1%CPEs: 36EXPL: 0

26 Mar 2015 — Memory leak in the TCP input module in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.3.xXO, 3.5.xE, 3.6.xE, 3.8.xS through 3.10.xS before 3.10.5S, and 3.11.xS and 3.12.xS before 3.12.3S allows remote attackers to cause a denial of service (memory consumption or device reload) by sending crafted TCP packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCum94811. Fuga de memoria en el módulo de entradas de TCP en Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, y 15.4 y IOS XE 3.3.xXO, 3.5.xE, 3.6.xE, 3.8.xS... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-tcpleak • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 1%CPEs: 45EXPL: 0

26 Mar 2015 — Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (device reload) via malformed Common Industrial Protocol (CIP) TCP packets, aka Bug ID CSCun63514. Cisco IOS 12.2, 12.4, 15.0, 15.2, y 15.3 permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) a través de paquetes TCP de Common Industrial Protocol (CIP) malformados, también conocido como Bug ID CSCun63514. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 1%CPEs: 23EXPL: 0

26 Mar 2015 — The Service Discovery Gateway (aka mDNS Gateway) in Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, and 15.4 and IOS XE 3.9.xS and 3.10.xS before 3.10.4S, 3.11.xS before 3.11.3S, 3.12.xS before 3.12.2S, and 3.13.xS before 3.13.1S allows remote attackers to cause a denial of service (device reload) by sending malformed mDNS UDP packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCup70579. Service Discovery Gateway (también conocido como mDNS Gateway) en Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, y 15.4 y IOS XE... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-mdns • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

21 Mar 2015 — The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 15.4S and 15.4(3)S allows remote attackers to modify configuration settings or cause a denial of service (partial service outage) by sending crafted Autonomic Networking (AN) messages on an intranet network, aka Bug ID CSCup62167. La implementación Autonomic Networking Infrastructure (ANI) de Cisco IOS 15.4S y 15.4(3)S permite a atacantes remotos modificar la configuración o causar una denegación de servicio (caída parcial del servici... • http://tools.cisco.com/security/center/viewAlert.x?alertId=37935 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 0%CPEs: 11EXPL: 0

06 Mar 2015 — The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connection attempt with a blank password, aka Bug IDs CSCuo09400 and CSCun16016. La característica Authentication Proxy en Cisco IOS no maneja correctamente los códigos de retorno AAA inválidos de los servidores RADIUS y... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0607 • CWE-287: Improper Authentication •

CVSS: 7.1EPSS: 0%CPEs: 10EXPL: 0

16 Feb 2015 — Race condition in the Common Classification Engine (CCE) in the Measurement, Aggregation, and Correlation Engine (MACE) implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCuj96752. Condición de carrera en Common Classification Engine (CCE) en la implamantación Measurement, Aggregation, and... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0609 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

13 Feb 2015 — The Zone-Based Firewall implementation in Cisco IOS 12.4(122)T and earlier does not properly manage session-object structures, which allows remote attackers to cause a denial of service (device reload) via crafted network traffic, aka Bug ID CSCul65003. La implementación Zone-Based Firewall en Cisco IOS 12.4(122)T y anteriores no maneja correctamente las estructuras de objetos de sesiones, lo que permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) a través de trafico manip... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0593 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

12 Feb 2015 — The Zone-Based Firewall implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers incorrect kernel-timer handling, aka Bug ID CSCuh25672. La implementación Zone-Based Firewall en Cisco IOS 15.4(2)T3 y anteriores permite a atacantes remotos causar una denegación de servicio (recarga del dispositivo) a través de trafico manipulado de la red que provoca el manejo incorrecto del temperizador del kernel, tambié... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0592 • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 0%CPEs: 10EXPL: 0

12 Feb 2015 — Race condition in the Measurement, Aggregation, and Correlation Engine (MACE) implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCul48736. Condición de carrera en la implementación Measurement, Aggregation, y Correlation Engine (MACE) en Cisco IOS 15.4(2)T3 y anteriores permite a atacantes... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0608 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •