Page 19 of 281 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 189EXPL: 0

03 Oct 2011 — Unspecified vulnerability in the NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload) by sending crafted H.323 packets to TCP port 1720, aka Bug ID CSCth11006. Vulnerabilidad no especificada en la implementación NAT en Cisco IOS v12.1 hasta v12.4 y v15.0 hasta v15.1, y IOS XE v3.1.xSG, permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) enviando paquetes manipul... • http://tools.cisco.com/security/center/viewAlert.x?alertId=24119 •

CVSS: 7.8EPSS: 0%CPEs: 189EXPL: 0

03 Oct 2011 — Memory leak in the NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (memory consumption or device reload) by sending crafted SIP packets to UDP port 5060, aka Bug ID CSCtj04672. Fallo de memoria en la implementación NAT en Cisco IOS v12.1 hasta v12.4 y v15.0 hasta v15.1, y IOS XE v3.1.xSG, permite a atacantes remotos provocar una denegación de servicio (consumo de memoria y recarga del dispositivo) enviando paqu... • http://tools.cisco.com/security/center/viewAlert.x?alertId=24120 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 74EXPL: 0

03 Oct 2011 — Memory leak in Cisco IOS 12.4, 15.0, and 15.1, Cisco IOS XE 2.5.x through 3.2.x, and Cisco Unified Communications Manager (CUCM) 6.x and 7.x before 7.1(5b)su4, 8.x before 8.5(1)su2, and 8.6 before 8.6(1) allows remote attackers to cause a denial of service (memory consumption and device reload or process failure) via a malformed SIP message, aka Bug IDs CSCtl86047 and CSCto88686. Una vulnerabilidad de pérdida de memoria en Cisco IOS v12.4, v15.0 y v15.1, Cisco IOS XE v2.5.x hasta v3.2.x, y Cisco Unified Com... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20110928-cucm • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

03 Oct 2011 — The provider-edge MPLS NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload) via a malformed SIP packet to UDP port 5060, aka Bug ID CSCti98219. La implementación MPLS NAT en Cisco IOS v12.1 hasta v12.4 y v15.0 hasta v15.1, y IOS XE v3.1.xSG, permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) a través de paquetes SIP mal formados en el puesto UDP 5060, también c... • http://tools.cisco.com/security/center/viewAlert.x?alertId=24121 •

CVSS: 10.0EPSS: 29%CPEs: 2EXPL: 0

03 Oct 2011 — Unspecified vulnerability in the Smart Install functionality in Cisco IOS 12.2 and 15.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via crafted TCP packets to port 4786, aka Bug ID CSCto10165. Una vulnerabilidad no especificada en la funcionalidad Smart Install en Cisco IOS v12.2 y v15.1 permite a atacantes remotos ejecutar código de su elección o causar una denegación de servicio (caída del dispositivo) a través de paquetes TCP debidamente modificados al pu... • http://tools.cisco.com/security/center/viewAlert.x?alertId=24115 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

03 Oct 2011 — Cisco IOS 12.4, 15.0, and 15.1 allows remote attackers to cause a denial of service (device reload) via malformed IPv6 packets, aka Bug ID CSCtj41194. Cisco IOS v12.4, v15.0 y v15.1 permiten a atacantes remotos causar una denegación de servicio (reinicio del dispositivo) a través de paquetes IPv6 mal formados. Problema también conocido como Bug ID CSCtj41194. • http://tools.cisco.com/security/center/viewAlert.x?alertId=24131 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 189EXPL: 0

03 Oct 2011 — Unspecified vulnerability in the NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload) by sending crafted SIP packets to UDP port 5060, aka Bug ID CSCti48483. Vulnerabilidad no especificada en la implementación NAT en Cisco IOS v12.1 hasta v12.4 y v15.0 hasta v15.1, y IOS XE v3.1.xSG, permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) enviando paquetes SIP manip... • http://tools.cisco.com/security/center/viewAlert.x?alertId=24120 •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

18 Aug 2011 — Cisco IOS 12.2, 12.3, 12.4, 15.0, and 15.1, when the data-link switching (DLSw) feature is configured, allows remote attackers to cause a denial of service (device crash) by sending a sequence of malformed packets and leveraging a "narrow timing window," aka Bug ID CSCtf74999, a different vulnerability than CVE-2007-0199, CVE-2008-1152, and CVE-2009-0629. Cisco IOS v12.2, v12.3, v12.4, v15.0 y v15.1, cuando el enlace de datos de conmutación (DLSw) está configurado, permite a atacantes remotos causar una den... • http://www.cisco.com/en/US/docs/cable/cmts/release/notes/12_2sc/uBR7200/122_33_SCF/caveats.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.8EPSS: 2%CPEs: 7EXPL: 0

11 Jul 2011 — Cisco IOS 12.4MDA before 12.4(24)MDA5 on the Cisco Content Services Gateway - Second Generation (CSG2) allows remote attackers to cause a denial of service (device reload) via crafted ICMP packets, aka Bug ID CSCtl79577. Cisco IOS 12.4MDA anterior a v12.4(24)MDA5 sobre Cisco Content Services Gateway - Segunda Generación (CSG2) permite a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) a través de paquetes manipulados ICMP, también conocido como Bug ID CSCtl79577. • http://osvdb.org/73657 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 1409EXPL: 0

07 Jun 2011 — The Neighbor Discovery (ND) protocol implementation in Cisco IOS on unspecified switches allows remote attackers to bypass the Router Advertisement Guarding functionality via a fragmented IPv6 packet in which the Router Advertisement (RA) message is contained in the second fragment, as demonstrated by (1) a packet in which the first fragment contains a long Destination Options extension header or (2) a packet in which the first fragment contains an ICMPv6 Echo Request message. La implementación del protocol... • http://seclists.org/fulldisclosure/2011/May/446 • CWE-16: Configuration •