Page 24 of 144 results (0.010 seconds)

CVSS: 5.0EPSS: 1%CPEs: 76EXPL: 0

Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption). Cisco Internetwork Operating System (IOS) 12.0S a 12.3T intenta procesar operaciones SNMP solicitadas en puertos inapropiados (UDP 162 y un puerto UDP escogido aleatoriamente), lo que permite a atacantes remotos causar una denegación de servicio (recarga del dispositivo y corrupción de memoria) • http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml http://www.kb.cert.org/vuls/id/162451 http://www.securityfocus.com/bid/10186 http://www.us-cert.gov/cas/techalerts/TA04-111B.html https://exchange.xforce.ibmcloud.com/vulnerabilities/15921 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5845 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cisco IOS 11.1(x) through 11.3(x) and 12.0(x) through 12.2(x), when configured for BGP routing, allows remote attackers to cause a denial of service (device reload) via malformed BGP (1) OPEN or (2) UPDATE messages. Cisco IOS 11.1 (x) a 11.3(x) y 12.0(x) a 12.2(x), cuando se configuran para encaminamiento BGP, permite a atacantes remotos causar una denegación de servicio (recarga de dipositivo) mediante mensajes BGP (1) OPEN o (2) UPDATE malformados. • http://www.cisco.com/warp/public/707/cisco-sa-20040616-bgp.shtml http://www.kb.cert.org/vuls/id/784540 https://exchange.xforce.ibmcloud.com/vulnerabilities/16427 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4948 •

CVSS: 7.5EPSS: 7%CPEs: 10EXPL: 0

Multiple vulnerabilities in the H.323 protocol implementation for Cisco IOS 11.3T through 12.2T allow remote attackers to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol. Múltiples vulnerabilidades en la implementación del protocolo H.323 de Cisco IOS 11.3T a 12.2T permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario, como se ha demostrado por el bloque de pruebas NISCC/OUSPG PROTOS para el protocolo H.225. • http://www.cert.org/advisories/CA-2004-01.html http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml http://www.kb.cert.org/vuls/id/749342 http://www.securityfocus.com/bid/9406 http://www.securitytracker.com/id?1008685 http://www.uniras.gov.uk/vuls/2004/006489/h323.htm https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4884 •

CVSS: 9.3EPSS: 0%CPEs: 12EXPL: 0

Cisco IOS 12.0 through 12.2, when IP routing is disabled, accepts false ICMP redirect messages, which allows remote attackers to cause a denial of service (network routing modification). • http://archives.neohapsis.com/archives/bugtraq/2003-02/0131.html http://securitytracker.com/id?1006075 http://www.securityfocus.com/bid/6823 https://exchange.xforce.ibmcloud.com/vulnerabilities/11306 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in the HTTP server for Cisco IOS 12.2 and earlier allows remote attackers to execute arbitrary code via an extremely long (2GB) HTTP GET request. Desbordamiento de búfer en el servidor HTTP de Cisco IOS 12.2 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante una petición HTTP GET extremadamente larga (2GB). • https://www.exploit-db.com/exploits/77 http://www.cisco.com/warp/public/707/cisco-sn-20030730-ios-2gb-get.shtml http://www.kb.cert.org/vuls/id/579324 •