Page 38 of 277 results (0.006 seconds)

CVSS: 7.8EPSS: 2%CPEs: 3EXPL: 0

Memory leak in the H.323 implementation in Cisco IOS 12.1 through 12.4, and 15.0M before 15.0(1)M1, allows remote attackers to cause a denial of service (memory consumption and device reload) via malformed H.323 packets, aka Bug ID CSCtb93855. Fuga de memoria en la implementación H.323 en Cisco IOS v12.1 a la v12.4, y v15.0M anterior a v15.0(1)M1, permite a atacantes remotos provocar una denegación de servicio (consumo de memoria y reinicio de dispositivo) a través de paquetes H.323 mal formados. También conocido como Bug ID CSCtb93855. • http://osvdb.org/63181 http://secunia.com/advisories/39067 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee4.shtml http://www.securityfocus.com/bid/38934 http://www.securitytracker.com/id?1023742 http://www.vupen.com/english/advisories/2010/0706 https://exchange.xforce.ibmcloud.com/vulnerabilities/57140 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 93EXPL: 0

Cisco IOS 12.1 through 12.4, when Cisco Unified Communications Manager Express (CME) or Cisco Unified Survivable Remote Site Telephony (SRST) is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug ID CSCsz48614, the "SCCP Packet Processing Denial of Service Vulnerability." Cisco IOS v12.1 a la v12.4, cuando Cisco Unified Communications Manager Express (CME) o Cisco Unified Survivable Remote Site Telephony (SRST) está activado, permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de un mensaje Skinny Client Control Protocol (SCCP) mal formado. También conocido como Bug ID CSCsz48614, el "Vulnerabilidad de denegación de servicio SCCP Packet Processing ." • http://secunia.com/advisories/39069 http://tools.cisco.com/security/center/viewAlert.x?alertId=20069 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f33.shtml •

CVSS: 7.8EPSS: 1%CPEs: 93EXPL: 0

Cisco IOS 12.1 through 12.4, when Cisco Unified Communications Manager Express (CME) or Cisco Unified Survivable Remote Site Telephony (SRST) is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug ID CSCsz49741, the "SCCP Request Handling Denial of Service Vulnerability." Cisco IOS v12.1 hasta v12.4, cuando Cisco Unified Communications Manager Express (CME) o Cisco Unified Survivable Remote Site Telephony (SRST) está habilitado, permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) a través de un mensaje mal formado Skinny Client Control Protocol (SCCP). También se conoce como Bug ID CSCsz49741, la " Vulnerabilidad de Denegación de Servicio de Manejo de Solicitudes SCCP." • http://osvdb.org/63177 http://secunia.com/advisories/39069 http://tools.cisco.com/security/center/viewAlert.x?alertId=20070 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f33.shtml https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6625 •

CVSS: 6.8EPSS: 0%CPEs: 288EXPL: 0

Cisco IOS 12.0 through 12.4, when IP-based tunnels and the Cisco Express Forwarding feature are enabled, allows remote attackers to cause a denial of service (device reload) via a malformed packet that is not properly handled during switching from one tunnel to a second tunnel, aka Bug IDs CSCsh97579 and CSCsq31776. Cisco IOS v12.0 hasta la v12.4, cuando están activados los túneles basados en IP y la utilidad "Cisco Express Forwarding", permite a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) a través de paquetes malformados que no son apropiadamente tratados durante el cambio de un túnel a un segundo túnel, también conocido como Bug IDs CSCsh97579 y CSCsq31776. • http://osvdb.org/58333 http://tools.cisco.com/security/center/viewAlert.x?alertId=18893 http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080af8113.html http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8115.shtml http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep09.html http://www.securitytracker.com/id?1022930 http://www.vupen.com/english/advisories/2009/2759 •

CVSS: 7.1EPSS: 2%CPEs: 304EXPL: 0

Cisco IOS 12.0 through 12.4, when IP-based tunnels and the Cisco Express Forwarding feature are enabled, allows remote attackers to cause a denial of service (device reload) via malformed packets, aka Bug ID CSCsx70889. Cisco IOS v12.0 hasta 12.4, cuando está habilitada la funcionalidad de túnel basado en IP y el Cisco Express Forwarding, permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) mediante paquetes deformados, también conocido como Bug ID CSCsx70889. • http://osvdb.org/58334 http://tools.cisco.com/security/center/viewAlert.x?alertId=18895 http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080af8113.html http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8115.shtml http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep09.html http://www.securitytracker.com/id?1022930 http://www.vupen.com/english/advisories/2009/2759 •