Page 52 of 285 results (0.040 seconds)

CVSS: 5.0EPSS: 1%CPEs: 17EXPL: 0

Cisco IOS 2.2(18)EW, 12.2(18)EWA, 12.2(14)SZ, 12.2(18)S, 12.2(18)SE, 12.2(18)SV, 12.2(18)SW, and other versions without the "no service dhcp" command, keep undeliverable DHCP packets in the queue instead of dropping them, which allows remote attackers to cause a denial of service (dropped traffic) via multiple undeliverable DHCP packets that exceed the input queue size. • http://www.ciac.org/ciac/bulletins/p-034.shtml http://www.cisco.com/warp/public/707/cisco-sa-20041110-dhcp.shtml http://www.kb.cert.org/vuls/id/630104 http://www.us-cert.gov/cas/techalerts/TA04-316A.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5632 •

CVSS: 5.0EPSS: 2%CPEs: 8EXPL: 0

IP Security VPN Services Module (VPNSM) in Cisco Catalyst 6500 Series Switch and the Cisco 7600 Series Internet Routers running IOS before 12.2(17b)SXA, before 12.2(17d)SXB, or before 12.2(14)SY03 could allow remote attackers to cause a denial of service (device crash and reload) via a malformed Internet Key Exchange (IKE) packet. El Módulo de Servicios de Seguridad VPN (VPNSM) del Cisco Catalyst 6500 Series Switch y el Cisco 7600 Series Internet Routers corriendo IOS anterioreas a 12.2(17b)SXA, anteriores a 12.2(17d)SXB, o anteriores a before 12.2(14)SY03) podría permitir a atacantes remotos causar una denegación de servicio (caída y reinicio del dispositivo) mediante un paquete Internet Key Exchange (IKE) malformado. • http://www.cisco.com/warp/public/707/cisco-sa-20040408-vpnsm.shtml http://www.kb.cert.org/vuls/id/904310 http://www.securityfocus.com/bid/10083 https://exchange.xforce.ibmcloud.com/vulnerabilities/15797 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5696 •

CVSS: 5.0EPSS: 1%CPEs: 76EXPL: 0

Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption). Cisco Internetwork Operating System (IOS) 12.0S a 12.3T intenta procesar operaciones SNMP solicitadas en puertos inapropiados (UDP 162 y un puerto UDP escogido aleatoriamente), lo que permite a atacantes remotos causar una denegación de servicio (recarga del dispositivo y corrupción de memoria) • http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml http://www.kb.cert.org/vuls/id/162451 http://www.securityfocus.com/bid/10186 http://www.us-cert.gov/cas/techalerts/TA04-111B.html https://exchange.xforce.ibmcloud.com/vulnerabilities/15921 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5845 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cisco IOS 11.1(x) through 11.3(x) and 12.0(x) through 12.2(x), when configured for BGP routing, allows remote attackers to cause a denial of service (device reload) via malformed BGP (1) OPEN or (2) UPDATE messages. Cisco IOS 11.1 (x) a 11.3(x) y 12.0(x) a 12.2(x), cuando se configuran para encaminamiento BGP, permite a atacantes remotos causar una denegación de servicio (recarga de dipositivo) mediante mensajes BGP (1) OPEN o (2) UPDATE malformados. • http://www.cisco.com/warp/public/707/cisco-sa-20040616-bgp.shtml http://www.kb.cert.org/vuls/id/784540 https://exchange.xforce.ibmcloud.com/vulnerabilities/16427 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4948 •

CVSS: 4.7EPSS: 0%CPEs: 3EXPL: 1

Cisco 6000, 6500, and 7600 series systems with Multilayer Switch Feature Card 2 (MSFC2) and a FlexWAN or OSM module allow local users to cause a denial of service (hang or reset) by sending a layer 2 frame packet that encapsulates a layer 3 packet, but has inconsistent length values with that packet. Los sistemas Cisco de la serie 6000, 6500 y 76000 con Multilayer Switch Feature Card 2 (MSFC2) y módulo OSM FlexWAN permiten que usuarios locales causen una denegación de servicio enviando un paquete de capa 2 que encapsule otro de capa 3, pero con valores de longitud incorrecto para ese paquete. • https://www.exploit-db.com/exploits/23638 http://secunia.com/advisories/10780 http://www.cisco.com/warp/public/707/cisco-sa-20040203-cat6k.shtml http://www.kb.cert.org/vuls/id/810062 http://www.securityfocus.com/bid/9562 https://exchange.xforce.ibmcloud.com/vulnerabilities/15013 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5828 • CWE-20: Improper Input Validation •