Page 40 of 241 results (0.003 seconds)

CVSS: 7.8EPSS: 1%CPEs: 3EXPL: 0

Memory leak in the NAT feature in Cisco IOS 12.4, 15.0, and 15.1 allows remote attackers to cause a denial of service (memory consumption, and device hang or reload) via SIP packets that require translation, related to a "memory starvation vulnerability," aka Bug ID CSCti35326. Un fallo de memoria en la función de NAT en Cisco IOS v12.4, v15.0 y v15.1 permite a atacantes remotos causar una denegación de servicio (consumo de memoria y cuelgue o caida del dispositivo) a través de paquetes SIP que requieren traducción. Se trata de un problema relacionado con una "vulnerabilidad de falta de memoria", Bug ID aka CSCti35326. • http://osvdb.org/80701 http://secunia.com/advisories/48515 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-nat http://www.securityfocus.com/bid/52758 http://www.securitytracker.com/id?1026864 https://exchange.xforce.ibmcloud.com/vulnerabilities/74432 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 1%CPEs: 2EXPL: 0

The WAAS Express feature in Cisco IOS 15.1 and 15.2 allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted transit traffic, aka Bug ID CSCtt45381. La funcionalidad WAAS Express de Cisco IOS v15.1 y v15.2 permite a atacantes remotos provocar una denegación de servicio (por excesivo consumo de memoria o reinicio del dispositivo) a través de tráfico de tránsito específicamente modificado, también conocido como Bug ID CSCtt45381. • http://osvdb.org/80702 http://secunia.com/advisories/48595 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-mace http://www.securityfocus.com/bid/52751 http://www.securitytracker.com/id?1026862 https://exchange.xforce.ibmcloud.com/vulnerabilities/74428 • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 1%CPEs: 2EXPL: 0

The MACE feature in Cisco IOS 15.1 and 15.2 allows remote attackers to cause a denial of service (device reload) via crafted transit traffic, aka Bug IDs CSCtq64987 and CSCtu57226. La funcionalidad MACE en Cisco IOS v15.1 y v15.2 permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) a través de tráfico de tránsito modificado a mano. Se trata de un problema tambien conocido como Bug Id CSCtq64987 y CSCtu57226. • http://osvdb.org/80703 http://secunia.com/advisories/48595 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-mace http://www.securityfocus.com/bid/52751 http://www.securitytracker.com/id?1026862 https://exchange.xforce.ibmcloud.com/vulnerabilities/74429 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 758EXPL: 0

The IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.2 and IOS XE 2.1.x through 2.6.x and 3.1.xS through 3.4.xS before 3.4.2S, 3.5.xS before 3.5.1S, and 3.2.xSG before 3.2.2SG allows remote attackers to cause a denial of service (device reload) by sending IKE UDP packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCts38429. La implementación de IKEv1 en Cisco IOS v12.2 a v12.4 y v15.0 a v15.2 y en IOS XE v2.1.x a v2.6.x y v3.1.xS a 3.4.xS antes de v3.4.2S, v3.5.xS antes de v3.5.1S y 3.2.xSG antes de v3.2.2SG permite a atacantes remotos causar una denegación de servicio (reinicio del dispositivo) mediante el envío de paquetes IKE UDP sobre (1) IPv4 o (2) IPv6. Se trata de un problema también conocido como Bug ID CSCts38429. • http://osvdb.org/80700 http://secunia.com/advisories/48605 http://secunia.com/advisories/48607 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-ike http://www.securityfocus.com/bid/52757 http://www.securitytracker.com/id?1026863 https://exchange.xforce.ibmcloud.com/vulnerabilities/74427 • CWE-310: Cryptographic Issues •

CVSS: 7.8EPSS: 2%CPEs: 4EXPL: 0

The Smart Install feature in Cisco IOS 12.2, 15.0, 15.1, and 15.2 allows remote attackers to cause a denial of service (device reload) by sending a malformed Smart Install message over TCP, aka Bug ID CSCtt16051. La función Smart Install en Cisco IOS v12.2, v15.0, v15.1 y v15.2 permite a atacantes remotos causar una denegación de servicio (reinicio del dispositivo) mediante el envío de un mensaje Smart Install mal formado sobre TCP. Se trata de un problema también conocido como Bug ID CSCtt16051. • http://osvdb.org/80694 http://secunia.com/advisories/48610 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-smartinstall http://www.securityfocus.com/bid/52756 http://www.securitytracker.com/id?1026867 https://exchange.xforce.ibmcloud.com/vulnerabilities/74430 • CWE-20: Improper Input Validation •