Page 41 of 363 results (0.008 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1409EXPL: 0

The Neighbor Discovery (ND) protocol implementation in Cisco IOS on unspecified switches allows remote attackers to bypass the Router Advertisement Guarding functionality via a fragmented IPv6 packet in which the Router Advertisement (RA) message is contained in the second fragment, as demonstrated by (1) a packet in which the first fragment contains a long Destination Options extension header or (2) a packet in which the first fragment contains an ICMPv6 Echo Request message. La implementación del protocolo Neighbor Discovery ( ND ) en Cisco IOS en algunos switch sin especificar permite a atacantes remotos eludir la funcionalidad Router Advertisement Guarding a través de un paquete IPv6 fragmentado en el que el mensaje Router Advertisement (RA) aparece en el segundo fragmento, como lo demuestra (1) un paquete en el que el primer fragmento contiene una cabecera Destination Options de extensión larga o (2) un paquete en el que el primer fragmento contiene un mensaje de solicitud de eco ICMPv6. • http://seclists.org/fulldisclosure/2011/May/446 http://securityreason.com/securityalert/8271 https://exchange.xforce.ibmcloud.com/vulnerabilities/67940 • CWE-16: Configuration •

CVSS: 7.8EPSS: 2%CPEs: 3EXPL: 0

Unspecified vulnerability in Cisco IOS 12.4(24)MD before 12.4(24)MD2 on the Cisco Content Services Gateway Second Generation (aka CSG2) allows remote attackers to cause a denial of service (device hang or reload) via crafted TCP packets, aka Bug ID CSCth41891, a different vulnerability than CVE-2011-0349. Vulnerabilidad no especificada en Cisco IOS v12.4(24)MD anterior a v12.4(24)MD2 en el Cisco Content Services Gateway Second Generación (también conocido como CSG2) permite a atacantes remotos provocar una denegación de servicio (cuelgue o recarga) a través de paquetes TCP, error conocido con ID CSCth41891, una vulnerabilidad diferente de CVE-2011-0349. • http://osvdb.org/70722 http://secunia.com/advisories/43052 http://securitytracker.com/id?1024992 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6791d.shtml http://www.securityfocus.com/bid/46028 http://www.vupen.com/english/advisories/2011/0229 https://exchange.xforce.ibmcloud.com/vulnerabilities/64938 •

CVSS: 7.8EPSS: 2%CPEs: 3EXPL: 0

Unspecified vulnerability in Cisco IOS 12.4(24)MD before 12.4(24)MD2 on the Cisco Content Services Gateway Second Generation (aka CSG2) allows remote attackers to cause a denial of service (device hang or reload) via crafted TCP packets, aka Bug ID CSCth17178, a different vulnerability than CVE-2011-0350. Vulnerabilidad no especificada en Cisco IOS v12.4(24)MD anterior a v12.4(24)MD2 en el Cisco Content Services Gateway Second Generación (también conocido como CSG2) permite a atacantes remotos provocar una denegación de servicio (cuelgue o recarga) a través de paquetes TCP, error conocido con ID CSCth17178, una vulnerabilidad diferente de CVE-2011-0350. • http://osvdb.org/70721 http://secunia.com/advisories/43052 http://securitytracker.com/id?1024992 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6791d.shtml http://www.securityfocus.com/bid/46026 http://www.vupen.com/english/advisories/2011/0229 https://exchange.xforce.ibmcloud.com/vulnerabilities/64937 •

CVSS: 6.4EPSS: 0%CPEs: 8EXPL: 0

Cisco IOS 12.4(11)MD, 12.4(15)MD, 12.4(22)MD, 12.4(24)MD before 12.4(24)MD3, 12.4(22)MDA before 12.4(22)MDA5, and 12.4(24)MDA before 12.4(24)MDA3 on the Cisco Content Services Gateway Second Generation (aka CSG2) allows remote attackers to bypass intended access restrictions and intended billing restrictions by sending HTTP traffic to a restricted destination after sending HTTP traffic to an unrestricted destination, aka Bug ID CSCtk35917. Cisco IOS 12.4(11)MD, 12.4(15)MD, 12.4(22)MD, 12.4(24)MD antes de 12.4(24)MD3, 12.4(22)MDA anterior a 12.4(22)MDA5, y 12.4(24)MDA anterior a 12.4(24)MDA3 en el Cisco Content Services Gateway de segunda generación (también conocido como CSG2) permite a atacantes remotos evitar las restricciones de acceso establecidas y restricciones de facturación mediante el envío de tráfico HTTP a un destino restringido después de enviar el tráfico HTTP a un destino sin restricciones, también conocido como Bug ID CSCtk35917. • http://osvdb.org/70720 http://secunia.com/advisories/43052 http://securitytracker.com/id?1024992 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6791d.shtml http://www.securityfocus.com/bid/46022 http://www.vupen.com/english/advisories/2011/0229 https://exchange.xforce.ibmcloud.com/vulnerabilities/64936 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Memory leak in Cisco IOS before 15.0(1)XA5 might allow remote attackers to cause a denial of service (memory consumption) by sending a crafted SIP REGISTER message over UDP, aka Bug ID CSCtg41733. Fuga de memoria en Cisco IOS anterior a v15.0(1)XA5 podría permitir a atacantes remotos provocar una denegación de servicio (consumo de memoria) mediante el envío de un mensaje SIP REGISTER sobre UDP, también conocido como bug id CSCtg41733. • http://www.cisco.com/en/US/docs/ios/15_0/15_0x/15_01_XA/rn800xa.pdf http://www.securityfocus.com/bid/45786 https://exchange.xforce.ibmcloud.com/vulnerabilities/64588 • CWE-772: Missing Release of Resource after Effective Lifetime •