Page 40 of 328 results (0.008 seconds)

CVSS: 7.8EPSS: 1%CPEs: 93EXPL: 0

Cisco IOS 12.1 through 12.4, when Cisco Unified Communications Manager Express (CME) or Cisco Unified Survivable Remote Site Telephony (SRST) is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug ID CSCsz49741, the "SCCP Request Handling Denial of Service Vulnerability." Cisco IOS v12.1 hasta v12.4, cuando Cisco Unified Communications Manager Express (CME) o Cisco Unified Survivable Remote Site Telephony (SRST) está habilitado, permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) a través de un mensaje mal formado Skinny Client Control Protocol (SCCP). También se conoce como Bug ID CSCsz49741, la " Vulnerabilidad de Denegación de Servicio de Manejo de Solicitudes SCCP." • http://osvdb.org/63177 http://secunia.com/advisories/39069 http://tools.cisco.com/security/center/viewAlert.x?alertId=20070 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f33.shtml https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6625 •

CVSS: 6.8EPSS: 0%CPEs: 288EXPL: 0

Cisco IOS 12.0 through 12.4, when IP-based tunnels and the Cisco Express Forwarding feature are enabled, allows remote attackers to cause a denial of service (device reload) via a malformed packet that is not properly handled during switching from one tunnel to a second tunnel, aka Bug IDs CSCsh97579 and CSCsq31776. Cisco IOS v12.0 hasta la v12.4, cuando están activados los túneles basados en IP y la utilidad "Cisco Express Forwarding", permite a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) a través de paquetes malformados que no son apropiadamente tratados durante el cambio de un túnel a un segundo túnel, también conocido como Bug IDs CSCsh97579 y CSCsq31776. • http://osvdb.org/58333 http://tools.cisco.com/security/center/viewAlert.x?alertId=18893 http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080af8113.html http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8115.shtml http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep09.html http://www.securitytracker.com/id?1022930 http://www.vupen.com/english/advisories/2009/2759 •

CVSS: 7.1EPSS: 2%CPEs: 304EXPL: 0

Cisco IOS 12.0 through 12.4, when IP-based tunnels and the Cisco Express Forwarding feature are enabled, allows remote attackers to cause a denial of service (device reload) via malformed packets, aka Bug ID CSCsx70889. Cisco IOS v12.0 hasta 12.4, cuando está habilitada la funcionalidad de túnel basado en IP y el Cisco Express Forwarding, permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) mediante paquetes deformados, también conocido como Bug ID CSCsx70889. • http://osvdb.org/58334 http://tools.cisco.com/security/center/viewAlert.x?alertId=18895 http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080af8113.html http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8115.shtml http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep09.html http://www.securitytracker.com/id?1022930 http://www.vupen.com/english/advisories/2009/2759 •

CVSS: 7.1EPSS: 0%CPEs: 136EXPL: 0

Race condition in the Firewall Authentication Proxy feature in Cisco IOS 12.0 through 12.4 allows remote attackers to bypass authentication, or bypass the consent web page, via a crafted request, aka Bug ID CSCsy15227. Una condición de carrera en la función Firewall Authentication Proxy de Cisco IOS v12.0 hasta la v12.4 permite a atacantes remotos evitar la autenticación, o saltarse la página web de la autorización, a través de una solicitud debidamente modificada. Se trata del Bug ID CSCsy15227. • http://osvdb.org/58340 http://tools.cisco.com/security/center/viewAlert.x?alertId=18882 http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8132.shtml http://www.securityfocus.com/bid/36491 http://www.securitytracker.com/id?1022935 https://exchange.xforce.ibmcloud.com/vulnerabilities/53453 • CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 1%CPEs: 6EXPL: 0

Cisco IOS 12.2 through 12.4 and 15.0 through 15.1, Cisco IOS XE 2.5.x and 2.6.x before 2.6.1, and Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.x, 5.x before 5.1(3g), 6.x before 6.1(4), and 7.x before 7.1(2) allow remote attackers to cause a denial of service (device reload or voice-services outage) via a malformed SIP INVITE message that triggers an improper call to the sipSafeStrlen function, aka Bug IDs CSCsz40392 and CSCsz43987. Cisco Unified Communications Manager (también conocido como CUCM, formalmente CallManager) v4.x, v5.x anteriores a v5.1(3g), v6.x anteriores v6.1(4), y v7.x anteriores v7.1(2) permite a los atacantes remotos causar una denegación de servicio (parada del servicio de voz) a través de mensajes malformados SIP INVITE que lanzan una llamada incorrecta a la función sipSafeStrlen, también conocida como Bug ID CSCsz40392. • http://osvdb.org/57453 http://secunia.com/advisories/36498 http://secunia.com/advisories/36499 http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a30f.shtml http://www.securityfocus.com/bid/36152 http://www.securitytracker.com/id?1022775 •