Page 39 of 252 results (0.007 seconds)

CVSS: 7.8EPSS: 2%CPEs: 72EXPL: 0

Unspecified vulnerability in Cisco IOS 12.2 through 12.4 allows remote attackers to cause a denial of service (device reload) via a crafted H.323 packet, aka Bug ID CSCsz38104. Vulnerabilidad sin especificar en Cisco IOS v12.2 hasta la v12.4 permite a usuarios remotos provocar una denegación de servicio (recarga del dispositivo) a través de un paquete H.323 modificado. También conocido como Bug ID CSCsz38104. • http://osvdb.org/58337 http://tools.cisco.com/security/center/viewAlert.x?alertId=18885 http://www.cisco.com/en/US/products/products_security_advisory09186a0080af811a.shtml http://www.securityfocus.com/bid/36494 http://www.securitytracker.com/id?1022930 http://www.vupen.com/english/advisories/2009/2759 https://exchange.xforce.ibmcloud.com/vulnerabilities/53446 •

CVSS: 4.3EPSS: 0%CPEs: 7EXPL: 0

The Object Groups for Access Control Lists (ACLs) feature in Cisco IOS 12.2XNB, 12.2XNC, 12.2XND, 12.4MD, 12.4T, 12.4XZ, and 12.4YA allows remote attackers to bypass intended access restrictions via crafted requests, aka Bug IDs CSCsx07114, CSCsu70214, CSCsw47076, CSCsv48603, CSCsy54122, and CSCsu50252. Los "Object Groups" (grupos de objetos) para la funcionalidad de listas de control de acceso (ACLs) en Cisco IOS v12.2XNB, v12.2XNC, v12.2XND, v12.4MD, v12.4T, v12.4XZ y v12.4YA permiten a los usuarios remotos evitar las restricciones establecidas a través de peticiones modificadas. También conocido como IDs CSCsx07114, CSCsu70214, CSCsw47076, CSCsv48603, CSCsy54122 y CSCsu50252. • http://osvdb.org/58338 http://tools.cisco.com/security/center/viewAlert.x?alertId=18876 http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8119.shtml http://www.securityfocus.com/bid/36495 http://www.securitytracker.com/id?1022933 http://www.vupen.com/english/advisories/2009/2759 •

CVSS: 7.8EPSS: 1%CPEs: 6EXPL: 0

Cisco IOS 12.2 through 12.4 and 15.0 through 15.1, Cisco IOS XE 2.5.x and 2.6.x before 2.6.1, and Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.x, 5.x before 5.1(3g), 6.x before 6.1(4), and 7.x before 7.1(2) allow remote attackers to cause a denial of service (device reload or voice-services outage) via a malformed SIP INVITE message that triggers an improper call to the sipSafeStrlen function, aka Bug IDs CSCsz40392 and CSCsz43987. Cisco Unified Communications Manager (también conocido como CUCM, formalmente CallManager) v4.x, v5.x anteriores a v5.1(3g), v6.x anteriores v6.1(4), y v7.x anteriores v7.1(2) permite a los atacantes remotos causar una denegación de servicio (parada del servicio de voz) a través de mensajes malformados SIP INVITE que lanzan una llamada incorrecta a la función sipSafeStrlen, también conocida como Bug ID CSCsz40392. • http://osvdb.org/57453 http://secunia.com/advisories/36498 http://secunia.com/advisories/36499 http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a30f.shtml http://www.securityfocus.com/bid/36152 http://www.securitytracker.com/id?1022775 •

CVSS: 7.1EPSS: 1%CPEs: 15EXPL: 0

Cisco IOS 12.0(32)S12 through 12.0(32)S13 and 12.0(33)S3 through 12.0(33)S4, 12.0(32)SY8 through 12.0(32)SY9, 12.2(33)SXI1, 12.2XNC before 12.2(33)XNC2, 12.2XND before 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 through 2.3.1t and 2.4 through 2.4.0; when RFC4893 BGP routing is enabled, allows remote attackers to cause a denial of service (memory corruption and device reload) by using an RFC4271 peer to send an update with a long series of AS numbers, aka Bug ID CSCsy86021. Cisco IOS v12.0(32)S12 hasta v12.0(32)S13 y v12.0(33)S3 hasta v12.0(33)S4, v12.0(32)SY8 hasta v12.0(32)SY9, v12.2(33)SXI1, v12.2XNC anterior a v12.2(33)XNC2, v12.2XND anterior a v12.2(33)XND1, y v12.4(24)T1; y IOS XE v2.3 hasta v2.3.1t y v2.4 hasta v2.4.0; cuando el enrutado RFC4893 BGP está habilitado, lo que permite a los atacantes remotos causar una denegación de servicio (corrupción de memoria o reinicio del dispositivo) usando un par RFC4271 para enviar una actualización con una serie larga de números AS, también conocido como fallo ID CSCsy86021. • http://secunia.com/advisories/36046 http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml http://www.securityfocus.com/bid/35862 http://www.securitytracker.com/id?1022619 http://www.vupen.com/english/advisories/2009/2082 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6697 • CWE-399: Resource Management Errors •

CVSS: 5.4EPSS: 1%CPEs: 15EXPL: 0

Cisco IOS 12.0(32)S12 through 12.0(32)S13 and 12.0(33)S3 through 12.0(33)S4, 12.0(32)SY8 through 12.0(32)SY9, 12.2(33)SXI1 through 12.2(33)SXI2, 12.2XNC before 12.2(33)XNC2, 12.2XND before 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 through 2.3.1t and 2.4 through 2.4.0; when RFC4893 BGP routing is enabled, allows remote attackers to cause a denial of service (device reload) by using an RFC4271 peer to send a malformed update, aka Bug ID CSCta33973. Cisco IOS v12.0(32)S12 hasta v12.0(32)S13 y v12.0(33)S3 hasta v12.0(33)S4, v12.0(32)SY8 hasta v12.0(32)SY9, v12.2(33)SXI1 hasta v12.2(33)SXI2, v12.2XNC hasta v12.2(33)XNC2, v12.2XND hasta v12.2(33)XND1, y v12.4(24)T1; y IOS XE v2.3 hasta v2.3.1t y v2.4 hasta v2.4.0; cuando el enrutado RFC4893 BGP está habilitado, lo que permite a los atacantes remoto causar una denegación de servicio (recarga del dispositivo) usando un par RFC4271 para enviar una actualización malformado, también conocido como Bud ID CSCta33973. • http://secunia.com/advisories/36046 http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml http://www.securityfocus.com/bid/35860 http://www.securitytracker.com/id?1022619 http://www.vupen.com/english/advisories/2009/2082 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6853 • CWE-16: Configuration •