Page 4 of 19 results (0.026 seconds)

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 0

The Unified Messaging Service (UMS) in Cisco Unity Connection 10.5 and earlier allows remote authenticated users to obtain sensitive information by reading log files, aka Bug ID CSCur06493. Unified Messaging Service (UMS) en Cisco Unity Connection 10.5 y anteriores permite a usuarios remotos autenticados obtener información sensible mediante la lectura de ficheros del registro, también conocido como Bug ID CSCur06493. • http://secunia.com/advisories/62106 http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7988 http://tools.cisco.com/security/center/viewAlert.x?alertId=36340 http://www.securitytracker.com/id/1031177 https://exchange.xforce.ibmcloud.com/vulnerabilities/98493 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

Memory leak in Cisco Unity Connection 9.x allows remote attackers to cause a denial of service (memory consumption and process crash) by sending many TCP requests, aka Bug ID CSCud59736. Pérdida de memoria en Cisco Unity Connection v9.x que permite ataques remotos que provocan una denegación de servicios (consumo de memoria y caída de procesos) mediante el envío de muchas solicitudes TPC, ID del error CSCud59736. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1129 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

Cisco Unity Connection (UC) 8.6, 9.0, and 9.5 allows remote attackers to cause a denial of service (CPU consumption) via malformed UDP packets, aka Bug ID CSCtz76269. Cisco Unity Connection (UC) v8.6, 9.0, y v9.5 permite a los atacantes remotos a provocar una denegación de servicio (consumo de CPU) a través de paquetes UDP manipulados también conocido como Bug ID CSCtz76269. • http://www.cisco.com/web/software/282074295/93949/cucm-readme-862asu2-Rev2.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/78922 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 93%CPEs: 296EXPL: 2

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64/SCOSA-2005.64.txt http://secunia.com/advisories/15393 http://secunia.com/advisories/15417 http://secunia.com/advisories/18222 http://secunia.com/advisories/18662 http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml http:/& •