Page 2 of 8 results (0.010 seconds)

CVSS: 5.0EPSS: 6%CPEs: 6EXPL: 0

Unspecified vulnerability in the Nortel CS 1000 M media card in Enterprise VoIP-Core-CS 1000E, 1000M, and 1000S 04.50W before 20070523 in Meridian/CS 1000 allows remote attackers to cause a denial of service (card hang) via unspecified vectors. Vulnerabilidad no especificada en la tarjeta Nortel CS 1000 M en Enterprise VoIP-Core-CS 1000E, 1000M, y 1000S 04.50W anterior al 23/05/2007 en Meridian/CS 1000 permite a atacantes remotos provocar una denegación de servicio (cuelgue de la tarjeta) a través de vectores no especificados. • http://osvdb.org/36525 http://secunia.com/advisories/25409 http://www.securityfocus.com/bid/24131 http://www.securitytracker.com/id?1018128 http://www.vupen.com/english/advisories/2007/1927 http://www116.nortelnetworks.com/pub/repository/CLARIFY/DOCUMENT/2007/21/022325-01.pdf http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=58493 https://exchange.xforce.ibmcloud.com/vulnerabilities/34480 •

CVSS: 5.0EPSS: 93%CPEs: 296EXPL: 2

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64/SCOSA-2005.64.txt http://secunia.com/advisories/15393 http://secunia.com/advisories/15417 http://secunia.com/advisories/18222 http://secunia.com/advisories/18662 http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml http:/& •

CVSS: 7.5EPSS: 4%CPEs: 3EXPL: 0

Multiple vulnerabilities in the H.323 protocol implementation for Nortel Networks Business Communications Manager (BCM), Succession 1000 IP Trunk and IP Peer Networking, and 802.11 Wireless IP Gateway allow remote attackers to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol. Múltiples vulnerabilidades en la implementación del protocolo H.323 en Nortel Networks Communications Manager (BCM), Succession 1000 IP Trunk and IP Peer Networking, y 802.11 Wireless IP Gateway permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario, como se demostró mediante el grupo de pruebas NISCC/OUSPG PROTOS para el protocolo H.225. • http://www.cert.org/advisories/CA-2004-01.html http://www.kb.cert.org/vuls/id/749342 http://www.securityfocus.com/bid/9406 http://www.securitytracker.com/id?1008687 http://www.uniras.gov.uk/vuls/2004/006489/h323.htm •