Page 46 of 284 results (0.006 seconds)

CVSS: 9.3EPSS: 90%CPEs: 5EXPL: 2

Buffer overflow in the Next Hop Resolution Protocol (NHRP) functionality in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (restart) and execute arbitrary code via a crafted NHRP packet. Un desbordamiento de búfer en la funcionalidad Next Hop Resolution Protocol (NHRP) en Cisco IOS versiones 12.0 hasta 12.4, permite a atacantes remotos causar una denegación de servicio (reinicio) y ejecutar código arbitrario por medio de un paquete NHRP especialmente diseñado. • https://www.exploit-db.com/exploits/4272 http://secunia.com/advisories/26360 http://www.cisco.com/en/US/products/products_security_advisory09186a008089963b.shtml http://www.kb.cert.org/vuls/id/201984 http://www.securityfocus.com/archive/1/475931/100/0/threaded http://www.securityfocus.com/bid/25238 http://www.securitytracker.com/id?1018535 http://www.vupen.com/english/advisories/2007/2818 https://exchange.xforce.ibmcloud.com/vulnerabilities/35889 https://oval.cisecurity.org/reposi • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 3%CPEs: 5EXPL: 0

Multiple memory leaks in Cisco IOS 12.0 through 12.4 allow remote attackers to cause a denial of service (device crash) via a malformed SIP packet, aka (1) CSCsf11855, (2) CSCeb21064, (3) CSCse40276, (4) CSCse68355, (5) CSCsf30058, (6) CSCsb24007, and (7) CSCsc60249. Múltiples fugas de memoria en el Cisco IOS 12.0 hasta el 12.4 permite a atacantes remotos provocar una denegación de servicio (caída del dispositivo) a través de un paquete SIP mal formado también conocido como (1) CSCsf11855, (2) CSCeb21064, (3) CSCse40276, (4) CSCse68355, (5) CSCsf30058, (6) CSCsb24007 y (7) CSCsc60249. • http://osvdb.org/36670 http://osvdb.org/36671 http://osvdb.org/36672 http://osvdb.org/36673 http://osvdb.org/36674 http://osvdb.org/36675 http://osvdb.org/36676 http://secunia.com/advisories/26363 http://securitytracker.com/id?1018533 http://www.cisco.com/en/US/products/products_security_advisory09186a0080899653.shtml http://www.securityfocus.com/bid/25239 http://www.vupen.com/english/advisories/2007/2816 https://exchange.xforce.ibmcloud.com/vulnerabilities/35890 •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in the server side of the Secure Copy (SCP) implementation in Cisco 12.2-based IOS allows remote authenticated users to read, write or overwrite any file on the device's filesystem via unknown vectors. Vulnerabilidad no especificada en el lado de servidor de la implementación de Secure Copy (SCP) de Cisco IOS basado en 12.2 permite a usuarios autenticados remotamente leer, escribir o sobrescribir cualquier archivo en el sistema de ficheros del dispositivo mediante vectores no especificados. • http://osvdb.org/36694 http://secunia.com/advisories/26361 http://www.cisco.com/warp/public/707/cisco-sa-20070808-scp.shtml http://www.securityfocus.com/bid/25240 http://www.securitytracker.com/id?1018534 http://www.vupen.com/english/advisories/2007/2817 https://exchange.xforce.ibmcloud.com/vulnerabilities/35872 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5542 •

CVSS: 7.8EPSS: 7%CPEs: 188EXPL: 0

Cisco IOS 12.4 and earlier, when using the crypto packages and SSL support is enabled, allows remote attackers to cause a denial of service via a malformed (1) ClientHello, (2) ChangeCipherSpec, or (3) Finished message during an SSL session. Cisco IOS 12.4 y anteriores, cuando utilizan paquetes de cifrado y el soporte SSL está habilitado, permite a atacantes remotos provocar una denegación de servicio mediante mensajes (1) ClientHello, (2) ChangeCipherSpec, o (3) Finished durante una sesión SSL. • http://secunia.com/advisories/25361 http://www.cisco.com/en/US/products/products_security_advisory09186a0080847c49.shtml http://www.osvdb.org/35339 http://www.securityfocus.com/bid/24097 http://www.securitytracker.com/id?1018094 http://www.vupen.com/english/advisories/2007/1910 https://exchange.xforce.ibmcloud.com/vulnerabilities/34432 https://exchange.xforce.ibmcloud.com/vulnerabilities/34436 https://exchange.xforce.ibmcloud.com/vulnerabilities/34442 https://oval.cisecurity.org/repository/search/def •

CVSS: 7.8EPSS: 5%CPEs: 23EXPL: 0

The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic. El Sistema de Prevención de Intrusiones (Intrusion Prevention System o IPS) de Cisco e IOS con el juego de funcionalidades Firewall/IPS no maneja adecuadamente determinadas codificaciones de caracteres Unicode de ancho completo y medio, lo cual podría permitir a atacantes remotos evadir la detección de tráfico HTTP. • http://secunia.com/advisories/25285 http://www.cisco.com/en/US/products/products_security_response09186a008083f82e.html http://www.gamasec.net/english/gs07-01.html http://www.kb.cert.org/vuls/id/739224 http://www.osvdb.org/35336 http://www.securityfocus.com/archive/1/468633/100/0/threaded http://www.securityfocus.com/bid/23980 http://www.securitytracker.com/id?1018053 http://www.securitytracker.com/id?1018054 http://www.vupen.com/english/advisories/2007/1803 https:/&#x •