Page 19 of 281 results (0.011 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

03 Oct 2011 — The provider-edge MPLS NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload) via a malformed SIP packet to UDP port 5060, aka Bug ID CSCti98219. La implementación MPLS NAT en Cisco IOS v12.1 hasta v12.4 y v15.0 hasta v15.1, y IOS XE v3.1.xSG, permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) a través de paquetes SIP mal formados en el puesto UDP 5060, también c... • http://tools.cisco.com/security/center/viewAlert.x?alertId=24121 •

CVSS: 7.8EPSS: 0%CPEs: 189EXPL: 0

03 Oct 2011 — Unspecified vulnerability in the NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload or hang) by sending crafted SIP packets to TCP port 5060, aka Bug ID CSCso02147. Vulnerabilidad no especificada en la implementación NAT en Cisco IOS v12.1 hasta v12.4 y v15.0 hasta v15.1, y IOS XE v3.1.xSG, permite a atacantes remotos provocar una denegación de servicio (el dispositivo se recarga o se cuelga) envian... • http://tools.cisco.com/security/center/viewAlert.x?alertId=24118 •

CVSS: 7.8EPSS: 0%CPEs: 189EXPL: 0

03 Oct 2011 — Memory leak in the NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (memory consumption or device reload) by sending crafted SIP packets to UDP port 5060, aka Bug ID CSCtj04672. Fallo de memoria en la implementación NAT en Cisco IOS v12.1 hasta v12.4 y v15.0 hasta v15.1, y IOS XE v3.1.xSG, permite a atacantes remotos provocar una denegación de servicio (consumo de memoria y recarga del dispositivo) enviando paqu... • http://tools.cisco.com/security/center/viewAlert.x?alertId=24120 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

03 Oct 2011 — Cisco IOS 12.4, 15.0, and 15.1 allows remote attackers to cause a denial of service (device reload) via malformed IPv6 packets, aka Bug ID CSCtj41194. Cisco IOS v12.4, v15.0 y v15.1 permiten a atacantes remotos causar una denegación de servicio (reinicio del dispositivo) a través de paquetes IPv6 mal formados. Problema también conocido como Bug ID CSCtj41194. • http://tools.cisco.com/security/center/viewAlert.x?alertId=24131 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 195EXPL: 0

03 Oct 2011 — Memory leak in the Data-link switching (aka DLSw) feature in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xS before 3.1.3S and 3.2.xS before 3.2.1S, when implemented over Fast Sequence Transport (FST), allows remote attackers to cause a denial of service (memory consumption and device reload or hang) via a crafted IP protocol 91 packet, aka Bug ID CSCth69364. Pérdida de memoria en la funcionalidad de conmutación Data-Link(alias DLSw) en Cisco IOS v12.1 a v12.4 y v15.0 a v15.1, y en Cisc... • http://tools.cisco.com/security/center/viewAlert.x?alertId=24116 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 189EXPL: 0

03 Oct 2011 — Unspecified vulnerability in the NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload) by sending crafted SIP packets to UDP port 5060, aka Bug ID CSCti48483. Vulnerabilidad no especificada en la implementación NAT en Cisco IOS v12.1 hasta v12.4 y v15.0 hasta v15.1, y IOS XE v3.1.xSG, permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) enviando paquetes SIP manip... • http://tools.cisco.com/security/center/viewAlert.x?alertId=24120 •

CVSS: 7.8EPSS: 0%CPEs: 189EXPL: 0

03 Oct 2011 — Unspecified vulnerability in the NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload) by sending crafted H.323 packets to TCP port 1720, aka Bug ID CSCth11006. Vulnerabilidad no especificada en la implementación NAT en Cisco IOS v12.1 hasta v12.4 y v15.0 hasta v15.1, y IOS XE v3.1.xSG, permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) enviando paquetes manipul... • http://tools.cisco.com/security/center/viewAlert.x?alertId=24119 •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

18 Aug 2011 — Cisco IOS 12.2, 12.3, 12.4, 15.0, and 15.1, when the data-link switching (DLSw) feature is configured, allows remote attackers to cause a denial of service (device crash) by sending a sequence of malformed packets and leveraging a "narrow timing window," aka Bug ID CSCtf74999, a different vulnerability than CVE-2007-0199, CVE-2008-1152, and CVE-2009-0629. Cisco IOS v12.2, v12.3, v12.4, v15.0 y v15.1, cuando el enlace de datos de conmutación (DLSw) está configurado, permite a atacantes remotos causar una den... • http://www.cisco.com/en/US/docs/cable/cmts/release/notes/12_2sc/uBR7200/122_33_SCF/caveats.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.8EPSS: 2%CPEs: 7EXPL: 0

11 Jul 2011 — Cisco IOS 12.4MDA before 12.4(24)MDA5 on the Cisco Content Services Gateway - Second Generation (CSG2) allows remote attackers to cause a denial of service (device reload) via crafted ICMP packets, aka Bug ID CSCtl79577. Cisco IOS 12.4MDA anterior a v12.4(24)MDA5 sobre Cisco Content Services Gateway - Segunda Generación (CSG2) permite a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) a través de paquetes manipulados ICMP, también conocido como Bug ID CSCtl79577. • http://osvdb.org/73657 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 1409EXPL: 0

07 Jun 2011 — The Neighbor Discovery (ND) protocol implementation in Cisco IOS on unspecified switches allows remote attackers to bypass the Router Advertisement Guarding functionality via a fragmented IPv6 packet in which the Router Advertisement (RA) message is contained in the second fragment, as demonstrated by (1) a packet in which the first fragment contains a long Destination Options extension header or (2) a packet in which the first fragment contains an ICMPv6 Echo Request message. La implementación del protocol... • http://seclists.org/fulldisclosure/2011/May/446 • CWE-16: Configuration •