Page 3 of 31 results (0.014 seconds)

CVSS: 7.5EPSS: 0%CPEs: 18EXPL: 1

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL+\ via SSH). The access control check for this menu does work and prohibits accessing the menu, which contains "Password recovery for specific user" options. The menu is believed to be accessible using a serial console. • https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

Cisco TelePresence Server 3.1 on 7010, Mobility Services Engine (MSE) 8710, Multiparty Media 310 and 320, and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (device reload) via malformed STUN packets, aka Bug ID CSCuv01348. Cisco TelePresence Server 3.1 sobre dispositivos 7010, Mobility Services Engine (MSE) 8710, Multiparty Media 310 y 320 y Virtual Machine (VM) permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) a través de paquetes STUN mal formados, también conocido como Bug ID CSCuv01348. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts2 http://www.securitytracker.com/id/1035500 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 0

The kernel in Cisco TelePresence Server 3.0 through 4.2(4.18) on Mobility Services Engine (MSE) 8710 devices allows remote attackers to cause a denial of service (panic and reboot) via a crafted sequence of IPv6 packets, aka Bug ID CSCuu46673. El kernel en Cisco TelePresence Server 3.0 hasta la versión 4.2(4.18) en dispositivos Mobility Services Engine (MSE) 8710 permite a atacantes remotos causar una denegación de servicio (pánico y reinicio) a través de una secuencia de paquetes IPv6 manipulada, también conocido como Bug ID CSCuu46673. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts http://www.securitytracker.com/id/1035499 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 1%CPEs: 9EXPL: 0

Cisco TelePresence Server 4.1(2.29) through 4.2(4.17) on 7010; Mobility Services Engine (MSE) 8710; Multiparty Media 310, 320, and 820; and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted HTTP requests that are not followed by an unspecified negotiation, aka Bug ID CSCuv47565. Cisco TelePresence Server 4.1(2.29) hasta la versión 4.2(4.17) sobre dispositivos 7010; Mobility Services Engine (MSE) 8710; Multiparty Media 310, 320 y 820; y Virtual Machine (VM) permite a atacantes remotos causar una denegación de servicio (consumo de memoria o recarga de dispositivo) a través de peticiones HTTP que no van seguidas de una negociación no especificada, también conocido como Bug ID CSCuv47565. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts1 http://www.securitytracker.com/id/1035501 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 82EXPL: 0

Cisco IOS 15.0 through 15.5 and IOS XE 3.3 through 3.16 allow remote attackers to cause a denial of service (device reload) via a crafted DHCPv6 Relay message, aka Bug ID CSCus55821. Cisco IOS 15.0 hasta la versión 15.5 y IOS XE 3.3 hasta la versión 3.16 permiten a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de un mensaje DHCPv6 Relay manipulado, también conocido como Bug ID CSCus55821. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-dhcpv6 http://www.securitytracker.com/id/1035381 • CWE-399: Resource Management Errors •