Page 49 of 275 results (0.036 seconds)

CVSS: 7.1EPSS: 1%CPEs: 204EXPL: 0

Cisco IOS 12.0 through 12.4 on Gigabit Switch Router (GSR) devices (aka 12000 Series routers) allows remote attackers to cause a denial of service (device crash) via a malformed Protocol Independent Multicast (PIM) packet. Vulnerabilidad en dispositivos Gigabit Switch Router (GSR),(aka 12000 Series routers), de Cisco IOS v12.0 a v12.4. Permite a atacantes de control remoto causar denegación de servicio (reinicio de dispositivo) a través de paquetes Multidifusión de Protocolo Independiente (Protocol Independent Multicast, PIM) mal formados. • http://secunia.com/advisories/31990 http://tools.cisco.com/security/center/viewAlert.x?alertId=16638 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01491.shtml http://www.securityfocus.com/bid/31356 http://www.securitytracker.com/id?1020936 http://www.vupen.com/english/advisories/2008/2670 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5477 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

Memory leak in the Session Initiation Protocol (SIP) implementation in Cisco IOS 12.2 through 12.4, when VoIP is configured, allows remote attackers to cause a denial of service (memory consumption and voice-service outage) via unspecified valid SIP messages. Fuga de memoria en la implementación de la Session Initiation Protocol (SIP) en Cisco IOS v12.2 a la v12.4, cuando VoIP está configurada, permite a atacantes remotos provocar una denegación de servicio (consumo de memoria y parada del servicio de voz) a través de mensajes SIP válidos no especificados. • http://secunia.com/advisories/31990 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01562.shtml http://www.securitytracker.com/id?1020939 http://www.vupen.com/english/advisories/2008/2670 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5927 • CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 8.5EPSS: 1%CPEs: 11EXPL: 0

Cisco IOS 12.0 through 12.4 on Cisco 10000, uBR10012 and uBR7200 series devices handles external UDP packets that are sent to 127.0.0.0/8 addresses intended for IPC communication within the device, which allows remote attackers to cause a denial of service (device or linecard reload) via crafted UDP packets, a different vulnerability than CVE-2008-3806. Cisco IOS v12.0 a la v12.4 sobre Cisco 10000, uBR10012 y uBR7200 maneja los paquetes externos UDP que son enviados a las direcciones 127.0.0.0/8 intencionadamente para la comunicación IPC en el propio dispositivo, esto permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo o de "linecard") a través de paquetes UDP manipulados. Vulnerabilidad distinta de CVE-2008-3806. • http://secunia.com/advisories/31990 http://tools.cisco.com/security/center/viewAlert.x?alertId=16646 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014ae.shtml http://www.securitytracker.com/id?1020935 http://www.vupen.com/english/advisories/2008/2670 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5910 •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

Unspecified vulnerability in Cisco IOS 12.2 and 12.4, when the L2TP mgmt daemon process is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted L2TP packet. Vulnerabilidad no especificada en Cisco IOS v12.2 y v12.4. Cuando está habilitado el proceso de demonio del L2TP (Layer 2 Tunneling Protocol) mgmt permite a atacantes remotos causar denegación de servicio (reinicio de dispositivo) a través un paquete L2TP manipulado. • http://secunia.com/advisories/31990 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0157a.shtml http://www.securitytracker.com/id?1020938 http://www.vupen.com/english/advisories/2008/2670 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5362 •

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in the Multi Protocol Label Switching (MPLS) Forwarding Infrastructure (MFI) in Cisco IOS 12.2 and 12.4 allows remote attackers to cause a denial of service (memory corruption) via crafted packets for which the software path is used. Vulnerabilidad sin especificar en el Multi Protocol Label Switching (MPLS) Forwarding Infrastructure (MFI) en Cisco IOS v12.2 y v12.4, permite a atacantes remotos provocar una denegación de servicio (corrupción de memoria) a través de paquetes manipulados en los que la ruta del software es usada. • http://secunia.com/advisories/31990 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014ac.shtml http://www.securitytracker.com/id?1020934 http://www.vupen.com/english/advisories/2008/2670 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5619 •