Page 32 of 275 results (0.031 seconds)

CVSS: 7.8EPSS: 0%CPEs: 34EXPL: 0

The SSHv2 implementation in Cisco IOS 12.2, 12.4, 15.0, 15.1, and 15.2 and IOS XE 2.3.x through 2.6.x and 3.1.xS through 3.4.xS before 3.4.2S allows remote attackers to cause a denial of service (device reload) via a crafted username in a reverse SSH login attempt, aka Bug ID CSCtr49064. La implementación de SSHv2 en Cisco IOS v12.2, v12.4, v15.0, v15.1 y v15.2 y en IOS XE v2.3.x a v2.6.x y v3.1.xS a 3.4.xS antes de v3.4.2S permite a atacantes remotos causar una denegación de servicio (reinicio del dispositivo ) a través de un nombre de usuario modificado en un intento de conexión SSH inverso. Se trata de un problema también como Bug ID CSCtr49064 . • http://osvdb.org/80695 http://secunia.com/advisories/48609 http://secunia.com/advisories/48641 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-ssh http://www.securityfocus.com/bid/52752 http://www.securitytracker.com/id?1026866 https://exchange.xforce.ibmcloud.com/vulnerabilities/74404 • CWE-310: Cryptographic Issues •

CVSS: 7.8EPSS: 1%CPEs: 3EXPL: 0

Memory leak in the NAT feature in Cisco IOS 12.4, 15.0, and 15.1 allows remote attackers to cause a denial of service (memory consumption, and device hang or reload) via SIP packets that require translation, related to a "memory starvation vulnerability," aka Bug ID CSCti35326. Un fallo de memoria en la función de NAT en Cisco IOS v12.4, v15.0 y v15.1 permite a atacantes remotos causar una denegación de servicio (consumo de memoria y cuelgue o caida del dispositivo) a través de paquetes SIP que requieren traducción. Se trata de un problema relacionado con una "vulnerabilidad de falta de memoria", Bug ID aka CSCti35326. • http://osvdb.org/80701 http://secunia.com/advisories/48515 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-nat http://www.securityfocus.com/bid/52758 http://www.securitytracker.com/id?1026864 https://exchange.xforce.ibmcloud.com/vulnerabilities/74432 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 758EXPL: 0

The IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.2 and IOS XE 2.1.x through 2.6.x and 3.1.xS through 3.4.xS before 3.4.2S, 3.5.xS before 3.5.1S, and 3.2.xSG before 3.2.2SG allows remote attackers to cause a denial of service (device reload) by sending IKE UDP packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCts38429. La implementación de IKEv1 en Cisco IOS v12.2 a v12.4 y v15.0 a v15.2 y en IOS XE v2.1.x a v2.6.x y v3.1.xS a 3.4.xS antes de v3.4.2S, v3.5.xS antes de v3.5.1S y 3.2.xSG antes de v3.2.2SG permite a atacantes remotos causar una denegación de servicio (reinicio del dispositivo) mediante el envío de paquetes IKE UDP sobre (1) IPv4 o (2) IPv6. Se trata de un problema también conocido como Bug ID CSCts38429. • http://osvdb.org/80700 http://secunia.com/advisories/48605 http://secunia.com/advisories/48607 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-ike http://www.securityfocus.com/bid/52757 http://www.securitytracker.com/id?1026863 https://exchange.xforce.ibmcloud.com/vulnerabilities/74427 • CWE-310: Cryptographic Issues •

CVSS: 7.8EPSS: 2%CPEs: 4EXPL: 0

The Smart Install feature in Cisco IOS 12.2, 15.0, 15.1, and 15.2 allows remote attackers to cause a denial of service (device reload) by sending a malformed Smart Install message over TCP, aka Bug ID CSCtt16051. La función Smart Install en Cisco IOS v12.2, v15.0, v15.1 y v15.2 permite a atacantes remotos causar una denegación de servicio (reinicio del dispositivo) mediante el envío de un mensaje Smart Install mal formado sobre TCP. Se trata de un problema también conocido como Bug ID CSCtt16051. • http://osvdb.org/80694 http://secunia.com/advisories/48610 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-smartinstall http://www.securityfocus.com/bid/52756 http://www.securitytracker.com/id?1026867 https://exchange.xforce.ibmcloud.com/vulnerabilities/74430 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 1%CPEs: 758EXPL: 0

The Multicast Source Discovery Protocol (MSDP) implementation in Cisco IOS 12.0, 12.2 through 12.4, and 15.0 through 15.2 and IOS XE 2.1.x through 2.6.x and 3.1.xS through 3.4.xS before 3.4.1S and 3.1.xSG and 3.2.xSG before 3.2.2SG allows remote attackers to cause a denial of service (device reload) via encapsulated IGMP data in an MSDP packet, aka Bug ID CSCtr28857. La implementación del protocolo de descubrimiento de origen Multicast (Multicast Source Discovery Protocol - MSDP) en Cisco IOS v12.0, v12.2 a v12.4 y v15.0 a v15.2 y en IOS XE v2.1.x a v2.6.x y v3.1.xS a v3.4.xS antes de v3.4.1S y v3.1.xSG y v3.2.xSG antes de v3.2.2SG permite a atacantes remotos causar una denegación de servicio (reinicio del dispositivo) a través de datos IGMP encapsulados en un paquete MSDP. Se trata de un problema también conocido como Bug ID CSCtr28857. • http://osvdb.org/80693 http://secunia.com/advisories/48630 http://secunia.com/advisories/48633 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp http://www.securityfocus.com/bid/52759 http://www.securitytracker.com/id?1026868 https://exchange.xforce.ibmcloud.com/vulnerabilities/74431 • CWE-400: Uncontrolled Resource Consumption •