Page 23 of 211 results (0.007 seconds)

CVSS: 7.8EPSS: 1%CPEs: 10EXPL: 0

Memory leak in Cisco IOS 15.0, 15.1, 15.2, and 15.4 and IOS XE 3.3.xSE before 3.3.2SE, 3.3.xXO before 3.3.1XO, 3.5.xE before 3.5.2E, and 3.11.xS before 3.11.1S allows remote attackers to cause a denial of service (memory consumption, and interface queue wedge or device reload) via malformed mDNS packets, aka Bug ID CSCuj58950. Fuga de información en Cisco IOS 15.0, 15.1, 15.2, y 15.4 y IOS XE 3.3.xSE anterior a 3.3.2SE, 3.3.xXO anterior a 3.3.1XO, 3.5.xE anterior a 3.5.2E, y 3.11.xS anterior a 3.11.1S permite a atacantes remotos causar una denegación de servicio (consumo de memoria o recarga de dispositivo) a través de paquetes mDNS malformados, también conocido como Bug ID CSCuj58950. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-mdns http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-mdns/cvrf/cisco-sa-20140924-mdns_cvrf.xml http://www.securityfocus.com/bid/70139 http://www.securitytracker.com/id/1030898 https://exchange.xforce.ibmcloud.com/vulnerabilities/96183 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 2%CPEs: 131EXPL: 0

Cisco IOS 12.0, 12.2, 12.4, 15.0, 15.1, 15.2, and 15.3 and IOS XE 2.x and 3.x before 3.7.4S; 3.2.xSE and 3.3.xSE before 3.3.2SE; 3.3.xSG and 3.4.xSG before 3.4.4SG; and 3.8.xS, 3.9.xS, and 3.10.xS before 3.10.1S allow remote attackers to cause a denial of service (device reload) via malformed RSVP packets, aka Bug ID CSCui11547. Cisco IOS 12.0, 12.2, 12.4, 15.0, 15.1, 15.2, y 15.3 y IOS XE 2.x y 3.x anterior a 3.7.4S; 3.2.xSE y 3.3.xSE anterior a 3.3.2SE; 3.3.xSG y 3.4.xSG anterior a 3.4.4SG; y 3.8.xS, 3.9.xS, y 3.10.xS anterior a 3.10.1S permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) a través de mensajes RSVP malformados, también conocido como Bug ID CSCui11547. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-rsvp http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-rsvp/cvrf/cisco-sa-20140924-rsvp_cvrf.xml http://www.securityfocus.com/bid/70131 http://www.securityfocus.com/bid/70183 http://www.securitytracker.com/id/1030893 https://exchange.xforce.ibmcloud.com/vulnerabilities/96178 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 1%CPEs: 5EXPL: 0

The ALG module in Cisco IOS 15.0 through 15.4 does not properly implement SIP over NAT, which allows remote attackers to cause a denial of service (device reload) via multipart SDP IPv4 traffic, aka Bug ID CSCun54071. El módulo ALG en Cisco IOS 15.0 hasta 15.4 no implementa debidamente SIP sobre NAT, lo que permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) a través de tráfico multipart SDP IPv4, también conocido como Bug ID CSCun54071. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-nat http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-nat/cvrf/cisco-sa-20140924-nat_cvrf.xml http://www.securityfocus.com/bid/70129 http://www.securitytracker.com/id/1030896 https://exchange.xforce.ibmcloud.com/vulnerabilities/96181 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 17EXPL: 0

The EnergyWise module in Cisco IOS 12.2, 15.0, 15.1, 15.2, and 15.4 and IOS XE 3.2.xXO, 3.3.xSG, 3.4.xSG, and 3.5.xE before 3.5.3E allows remote attackers to cause a denial of service (device reload) via a crafted IPv4 packet, aka Bug ID CSCup52101. El módulo EnergyWise en Cisco IOS 12.2, 15.0, 15.1, 15.2 y 15.4 y IOS XE 3.2.xXO, 3.3.xSG, 3.4.xSG y 3.5.xE anterior a 3.5.3E permite a atacantes remotos causar una denegación de servicio (reinicio de dispositivo) a través de un paquete IPv4 manipulado, también conocido como Bug ID CSCup52101. • http://secunia.com/advisories/60650 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140806-energywise http://www.securityfocus.com/bid/69066 http://www.securitytracker.com/id/1030682 https://exchange.xforce.ibmcloud.com/vulnerabilities/95137 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 0

The Locator/ID Separation Protocol (LISP) implementation in Cisco IOS 15.3(3)S and earlier and IOS XE does not properly validate parameters in ITR control messages, which allows remote attackers to cause a denial of service (CEF outage and packet drops) via malformed messages, aka Bug ID CSCun73782. La implementación Locator/ID Separation Protocol (LISP) en Cisco IOS 15.3(3)S y anteriores y IOS XE no valida debidamenete parámetros en mensajes de control ITR, lo que permite a atacantes remotos causar una denegación de servicio (interrupción de CEF y descargas de paquetes) a través de mensajes malformados, también conocido como Bug ID CSCun73782. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3262 http://tools.cisco.com/security/center/viewAlert.x?alertId=34233 http://www.securitytracker.com/id/1030243 • CWE-20: Improper Input Validation •