Page 47 of 283 results (0.010 seconds)

CVSS: 6.3EPSS: 0%CPEs: 1EXPL: 0

The IOS FTP Server in Cisco IOS 11.3 through 12.4 allows remote authenticated users to cause a denial of service (IOS reload) via unspecified vectors involving transferring files (aka bug ID CSCse29244). El servidor FTP IOS en Cisco IOS 11.3 hasta 12.4 permite a usuarios remotos autenticados provocar una denegación de servicio (recarga de IOS) mediante vectores no especificados involucrando transferencia de ficheros (también conocido como bug ID CSCse29244). • http://secunia.com/advisories/25199 http://www.cisco.com/en/US/products/products_security_advisory09186a00808399d0.shtml http://www.osvdb.org/35335 http://www.securityfocus.com/bid/23885 http://www.securitytracker.com/id?1018030 http://www.vupen.com/english/advisories/2007/1749 https://exchange.xforce.ibmcloud.com/vulnerabilities/34196 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5444 •

CVSS: 6.1EPSS: 2%CPEs: 9EXPL: 0

Unspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a denial of service (software reload) via a certain MPLS packet. Vulnerabilidad no especificada en Cisco IOS 12.2SXA, SXB, SXD, and SXF; y el MSFC2, MSFC2a y MSFC3 corriendo en Modo Híbrido en Cisco Catalyst 6000, 6500 y Cisco 7600 series systems; permite a atacantes remotos en un segmento de red local provocar una denegación de servicio (recarga de software) mediante un paquete MPLS concreto. • http://osvdb.org/33067 http://secunia.com/advisories/24348 http://www.cisco.com/warp/public/707/cisco-sa-20070228-mpls.shtml http://www.securitytracker.com/id?1017709 http://www.vupen.com/english/advisories/2007/0782 https://exchange.xforce.ibmcloud.com/vulnerabilities/32748 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5869 •

CVSS: 7.8EPSS: 5%CPEs: 253EXPL: 0

Cisco IOS allows remote attackers to cause a denial of service (crash) via a crafted IPv6 Type 0 Routing header. Cisco IOS permite a atacantes remotos provocar una denegación de servicio (caída) mediante una cabecera manipulada de IPv6 Type 0 Routing. • http://osvdb.org/32091 http://secunia.com/advisories/23867 http://securitytracker.com/id?1017550 http://www.cisco.com/en/US/products/products_security_advisory09186a00807cb0fd.shtml http://www.kb.cert.org/vuls/id/274760 http://www.securityfocus.com/bid/22210 http://www.us-cert.gov/cas/techalerts/TA07-024A.html http://www.vupen.com/english/advisories/2007/0329 https://exchange.xforce.ibmcloud.com/vulnerabilities/31715 https://oval.cisecurity.org/repository/search/definition/oval%3Ao •

CVSS: 10.0EPSS: 21%CPEs: 253EXPL: 0

Cisco IOS 9.x, 10.x, 11.x, and 12.x and IOS XR 2.0.x, 3.0.x, and 3.2.x allows remote attackers to cause a denial of service or execute arbitrary code via a crafted IP option in the IP header in a (1) ICMP, (2) PIMv2, (3) PGM, or (4) URD packet. Cisco IOS 9.x, 10.x, 11.x y 12.x y IOS XR 2.0.x, 3.0.x y 3.2.x permite a atacantes remotos provocar una denegación de servicio o ejecutar código de su elección mediante la manipulación de la opción IP en la cabecera IP de los paquetes 1) ICMP, (2) PIMv2, (3) PGM o (4) URD. • http://osvdb.org/32092 http://secunia.com/advisories/23867 http://securitytracker.com/id?1017555 http://www.cisco.com/en/US/products/products_security_advisory09186a00807cb157.shtml http://www.kb.cert.org/vuls/id/341288 http://www.securityfocus.com/bid/22211 http://www.us-cert.gov/cas/techalerts/TA07-024A.html http://www.vupen.com/english/advisories/2007/0329 https://exchange.xforce.ibmcloud.com/vulnerabilities/31725 https://oval.cisecurity.org/repository/search/definition/oval%3Ao •

CVSS: 7.8EPSS: 5%CPEs: 253EXPL: 0

Memory leak in the TCP listener in Cisco IOS 9.x, 10.x, 11.x, and 12.x allows remote attackers to cause a denial of service by sending crafted TCP traffic to an IPv4 address on the IOS device. Agujero de memoria en el oyente TCP de Cisco IOS 9.x, 10.x, 11.x y 12.x permite a atacantes remotos provocar una denegación de servicio mediante el envío de tráfico TCP manipulado a la dirección IPv4 en el dispositivo IOS. • http://osvdb.org/32093 http://secunia.com/advisories/23867 http://securitytracker.com/id?1017551 http://www.cisco.com/en/US/products/products_security_advisory09186a00807cb0e4.shtml http://www.kb.cert.org/vuls/id/217912 http://www.securityfocus.com/bid/22208 http://www.us-cert.gov/cas/techalerts/TA07-024A.html http://www.vupen.com/english/advisories/2007/0329 https://exchange.xforce.ibmcloud.com/vulnerabilities/31716 https://oval.cisecurity.org/repository/search/definition/oval%3Ao •