Page 22 of 149 results (0.012 seconds)

CVSS: 10.0EPSS: 21%CPEs: 253EXPL: 0

Cisco IOS 9.x, 10.x, 11.x, and 12.x and IOS XR 2.0.x, 3.0.x, and 3.2.x allows remote attackers to cause a denial of service or execute arbitrary code via a crafted IP option in the IP header in a (1) ICMP, (2) PIMv2, (3) PGM, or (4) URD packet. Cisco IOS 9.x, 10.x, 11.x y 12.x y IOS XR 2.0.x, 3.0.x y 3.2.x permite a atacantes remotos provocar una denegación de servicio o ejecutar código de su elección mediante la manipulación de la opción IP en la cabecera IP de los paquetes 1) ICMP, (2) PIMv2, (3) PGM o (4) URD. • http://osvdb.org/32092 http://secunia.com/advisories/23867 http://securitytracker.com/id?1017555 http://www.cisco.com/en/US/products/products_security_advisory09186a00807cb157.shtml http://www.kb.cert.org/vuls/id/341288 http://www.securityfocus.com/bid/22211 http://www.us-cert.gov/cas/techalerts/TA07-024A.html http://www.vupen.com/english/advisories/2007/0329 https://exchange.xforce.ibmcloud.com/vulnerabilities/31725 https://oval.cisecurity.org/repository/search/definition/oval%3Ao •

CVSS: 7.8EPSS: 5%CPEs: 253EXPL: 0

Memory leak in the TCP listener in Cisco IOS 9.x, 10.x, 11.x, and 12.x allows remote attackers to cause a denial of service by sending crafted TCP traffic to an IPv4 address on the IOS device. Agujero de memoria en el oyente TCP de Cisco IOS 9.x, 10.x, 11.x y 12.x permite a atacantes remotos provocar una denegación de servicio mediante el envío de tráfico TCP manipulado a la dirección IPv4 en el dispositivo IOS. • http://osvdb.org/32093 http://secunia.com/advisories/23867 http://securitytracker.com/id?1017551 http://www.cisco.com/en/US/products/products_security_advisory09186a00807cb0e4.shtml http://www.kb.cert.org/vuls/id/217912 http://www.securityfocus.com/bid/22208 http://www.us-cert.gov/cas/techalerts/TA07-024A.html http://www.vupen.com/english/advisories/2007/0329 https://exchange.xforce.ibmcloud.com/vulnerabilities/31716 https://oval.cisecurity.org/repository/search/definition/oval%3Ao •

CVSS: 5.0EPSS: 3%CPEs: 2EXPL: 0

The Data-link Switching (DLSw) feature in Cisco IOS 11.0 through 12.4 allows remote attackers to cause a denial of service (device reload) via "an invalid value in a DLSw message... during the capabilities exchange." La propiedad Data-link Switching (DLSw) en Cisco IOS 11.0 hata 12.4 permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) mediante "un valor inválido en un mensaje DLSw... durante el intercambio de habilidades". • http://osvdb.org/32683 http://secunia.com/advisories/23697 http://securitytracker.com/id?1017498 http://www.cisco.com/warp/public/707/cisco-sa-20070110-dlsw.shtml http://www.securityfocus.com/bid/21990 http://www.vupen.com/english/advisories/2007/0139 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5714 •

CVSS: 10.0EPSS: 2%CPEs: 228EXPL: 0

Cisco IOS 12.2 through 12.4 before 20060920, as used by Cisco IAD2430, IAD2431, and IAD2432 Integrated Access Devices, the VG224 Analog Phone Gateway, and the MWR 1900 and 1941 Mobile Wireless Edge Routers, is incorrectly identified as supporting DOCSIS, which allows remote attackers to gain read-write access via a hard-coded cable-docsis community string and read or modify arbitrary SNMP variables. Cisco IOS 12.2 hasta 12.4 anteriores al 20/09/2006, usados por Cisco IAD2430, IAD2431, y IAD2432 Integrated Access Devices, el VG224 Analog Phone Gateway, y el MWR 1900 y 1941 Mobile Wireless Edge Routers, está identificado de forma incorrecta como soporte DOCSIS, lo que permiet a un atacante remoto conseguir acceso lectura-escritura a través de una secuencia de hard-coded cable-docsis y leer o modificar variables SNMP de su elección. • http://secunia.com/advisories/21974 http://securitytracker.com/id?1016899 http://www.cisco.com/warp/public/707/cisco-sa-20060920-docsis.shtml http://www.kb.cert.org/vuls/id/123140 http://www.osvdb.org/29034 http://www.securityfocus.com/bid/20125 http://www.vupen.com/english/advisories/2006/3722 https://exchange.xforce.ibmcloud.com/vulnerabilities/29054 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5665 •

CVSS: 2.6EPSS: 12%CPEs: 3EXPL: 0

Cisco IOS 12.0, 12.1, and 12.2, when GRE IP tunneling is used and the RFC2784 compliance fixes are missing, does not verify the offset field of a GRE packet during decapsulation, which leads to an integer overflow that references data from incorrect memory locations, which allows remote attackers to inject crafted packets into the routing queue, possibly bypassing intended router ACLs. Cisco IOS 12.0, 12.1, y 12.2, cuando la tunelación GRE IP esta siendo usada y falta la conformidad RFC2784, no verifica el campo offset de un paquete GRE durante su encapsulación, lo cauls lleva a un desbordamiento de enteros que referencia datos desde localizaciones de memoria incorrectas, lo cual permite a un atacante remoto inyectar paquetes artesanales dentro de la cola de enrutamiento, posiblemente evitando la ACLs del router previsto. • http://secunia.com/advisories/21783 http://securityreason.com/securityalert/1526 http://securitytracker.com/id?1016799 http://www.cisco.com/en/US/tech/tk827/tk369/tsd_technology_security_response09186a008072cd7b.html http://www.osvdb.org/28590 http://www.phenoelit.de/stuff/CiscoGRE.txt http://www.securityfocus.com/archive/1/445322/100/0/threaded http://www.securityfocus.com/bid/19878 http://www.vupen.com/english/advisories/2006/3502 https://exchange.xforce.ibmcloud.com/vulnerabilities •