Page 50 of 278 results (0.006 seconds)

CVSS: 7.8EPSS: 2%CPEs: 17EXPL: 0

Cisco IOS 12.2 and 12.4, when NAT Skinny Call Control Protocol (SCCP) Fragmentation Support is enabled, allows remote attackers to cause a denial of service (device reload) via segmented SCCP messages, aka Cisco Bug ID CSCsi17020, a different vulnerability than CVE-2008-3810. En Cisco IOS v12.2 y 12.4, cuando el soporte de Fragmentación del protocolo de control de llamada NAT Skinny (SCCP) está habilitado, permite a atacantes de control remoto causar denegación de servicio (reinicio de dispositivo) a través de mensajes SCCP, aka Cisco Bug ID CSCsi17020, una vulnerabilidad distinta de CVE-2008-3810. • http://secunia.com/advisories/31990 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0148e.shtml http://www.securityfocus.com/bid/31359 http://www.securitytracker.com/id?1020937 http://www.vupen.com/english/advisories/2008/2670 https://exchange.xforce.ibmcloud.com/vulnerabilities/45535 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5900 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in the Multi Protocol Label Switching (MPLS) Forwarding Infrastructure (MFI) in Cisco IOS 12.2 and 12.4 allows remote attackers to cause a denial of service (memory corruption) via crafted packets for which the software path is used. Vulnerabilidad sin especificar en el Multi Protocol Label Switching (MPLS) Forwarding Infrastructure (MFI) en Cisco IOS v12.2 y v12.4, permite a atacantes remotos provocar una denegación de servicio (corrupción de memoria) a través de paquetes manipulados en los que la ruta del software es usada. • http://secunia.com/advisories/31990 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014ac.shtml http://www.securitytracker.com/id?1020934 http://www.vupen.com/english/advisories/2008/2670 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5619 •

CVSS: 7.8EPSS: 0%CPEs: 23EXPL: 0

The SERVICE.DNS signature engine in the Intrusion Prevention System (IPS) in Cisco IOS 12.3 and 12.4 allows remote attackers to cause a denial of service (device crash or hang) via network traffic that triggers unspecified IPS signatures, a different vulnerability than CVE-2008-1447. El motor de firma SERVICE.DNS en Intrusion Prevention System (IPS) en Cisco IOS v12.3 y v12.4, permite a atacantes remotos provocar una denegación de servicio (caída o cuelgue de dispositivo) a través de tráfico de red que lanza un firma IPS sin especificar. Vulnerabilidad distinta de CVE-2008-1447. • http://secunia.com/advisories/31990 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01556.shtml http://www.vupen.com/english/advisories/2008/2670 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6058 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Cisco IOS 12.4 allows remote attackers to cause a denial of service (device crash) via a normal, properly formed SSL packet that occurs during termination of an SSL session. Cisco IOS v12.4 permite a atacantes remotos provocar una denegación de servicio (caída de dispositivo) a través de un paquete SSL creado correctamente durante la finalización de una sesión SSL. • http://secunia.com/advisories/31990 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0146c.shtml http://www.securitytracker.com/id?1020930 http://www.vupen.com/english/advisories/2008/2670 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6087 •

CVSS: 7.1EPSS: 1%CPEs: 10EXPL: 0

Unspecified vulnerability in the Session Initiation Protocol (SIP) implementation in Cisco IOS 12.2 through 12.4 and Unified Communications Manager 4.1 through 6.1, when VoIP is configured, allows remote attackers to cause a denial of service (device or process reload) via unspecified valid SIP messages, aka Cisco Bug ID CSCsu38644, a different vulnerability than CVE-2008-3801 and CVE-2008-3802. Vulnerabilidad no especificada en la implementación de la Session Initiation Protocol en Cisco IOS v12.2 a la v12.4 y Unified Communications Manager v4.1 a la v6.1, cuando VoIP está configurada, permite a atacantes remotos provocar una denegación de servicio (reinicio de proceso o de dispositivo) a través de mensajes SIP válidos no especificados, también conocidos como "Cisco Bug ID CSCsu38644". Vulnerabilidad distinta de CVE-2008-3800 y CVE-2008-3802. • http://secunia.com/advisories/31990 http://secunia.com/advisories/32013 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01562.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0156a.shtml http://www.securityfocus.com/bid/31367 http://www.securitytracker.com/id?1020939 http://www.securitytracker.com/id?1020942 http://www.vupen.com/english/advisories/2008/2670 http://www.vupen.com/english/advisories/2008/2671 https://oval.cisecurity.org/re •