Page 6 of 103 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 41EXPL: 0

22 Mar 2017 — A vulnerability in the DHCP code for the Zero Touch Provisioning feature of Cisco ASR 920 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a format string vulnerability when processing a crafted DHCP packet for Zero Touch Provisioning. An attacker could exploit this vulnerability by sending a specially crafted DHCP packet to an affected device. An exploit could allow the attacker to cause the device to relo... • http://www.securityfocus.com/bid/97008 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 7.4EPSS: 0%CPEs: 161EXPL: 0

21 Mar 2017 — A vulnerability in the Autonomic Networking Infrastructure (ANI) registrar feature of Cisco IOS Software (possibly 15.2 through 15.6) and Cisco IOS XE Software (possibly 3.7 through 3.18, and 16) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted autonomic network channel discovery packet to a device that has all th... • http://www.securityfocus.com/bid/96972 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 143EXPL: 0

21 Mar 2017 — A vulnerability in the Autonomic Networking Infrastructure (ANI) feature of Cisco IOS Software (15.4 through 15.6) and Cisco IOS XE Software (3.7 through 3.18, and 16) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted IPv6 packet to a device that is running a Cisco IOS Software or Cisco IOS XE Software release that s... • http://www.securityfocus.com/bid/96971 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 32EXPL: 0

05 Oct 2016 — Cisco IOS 12.2 and IOS XE 3.14 through 3.16 and 16.1 allow remote attackers to cause a denial of service (device reload) via crafted IP Detail Record (IPDR) packets, aka Bug ID CSCuu35089. Cisco IOS 12.2 e IOS XE 3.14 hasta la versión 3.16 y 16.1 permiten a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) a través de paquetes IP Detail Record (IPDR) manipulados, vulnerabilidad también conocida como Bug ID CSCuu35089. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ipdr • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

22 Sep 2016 — The Zone-Based Firewall (ZBFW) functionality in Cisco IOS, possibly 15.4 and earlier, and IOS XE, possibly 3.13 and earlier, mishandles zone checking for existing sessions, which allows remote attackers to bypass intended resource-access restrictions via spoofed traffic that matches one of these sessions, aka Bug IDs CSCun94946 and CSCun96847. La funcionalidad Zone-Based Firewall (ZBFW) en Cisco IOS, posiblemente 15.4 y versiones anteriores e IOS XE, posiblemente 3.13 y versiones anteriores, no maneja adecu... • http://www.securityfocus.com/bid/93126 • CWE-20: Improper Input Validation •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

18 Sep 2016 — The Data in Motion (DMo) application in Cisco IOS 15.6(1)T and IOS XE, when the IOx feature set is enabled, allows remote attackers to cause a denial of service via a crafted packet, aka Bug IDs CSCuy82904, CSCuy82909, and CSCuy82912. La aplicación Data in Motion (DMo) en Cisco IOS 15.6(1)T e IOS XE, cuando el conjunto de características IOx está activado, permite a atacantes remotos provocar una denegación de servicio a través de un paquete manipulado, vulnerabilidad también conocida como Bug IDs CSCuy8290... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-ios-xe • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 0%CPEs: 10EXPL: 0

16 Feb 2015 — Race condition in the Common Classification Engine (CCE) in the Measurement, Aggregation, and Correlation Engine (MACE) implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCuj96752. Condición de carrera en Common Classification Engine (CCE) en la implamantación Measurement, Aggregation, and... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0609 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

12 Feb 2015 — The Zone-Based Firewall implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers incorrect kernel-timer handling, aka Bug ID CSCuh25672. La implementación Zone-Based Firewall en Cisco IOS 15.4(2)T3 y anteriores permite a atacantes remotos causar una denegación de servicio (recarga del dispositivo) a través de trafico manipulado de la red que provoca el manejo incorrecto del temperizador del kernel, tambié... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0592 • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 0%CPEs: 10EXPL: 0

12 Feb 2015 — Race condition in the Measurement, Aggregation, and Correlation Engine (MACE) implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCul48736. Condición de carrera en la implementación Measurement, Aggregation, y Correlation Engine (MACE) en Cisco IOS 15.4(2)T3 y anteriores permite a atacantes... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0608 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 5.9EPSS: 0%CPEs: 4EXPL: 0

12 Feb 2015 — Race condition in the object-group ACL feature in Cisco IOS 15.5(2)T and earlier allows remote attackers to bypass intended access restrictions via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCun21071. Condición de carrera en la característica object-group ACL en Cisco IOS 15.5(2)T y anteriores permite a atacantes remotos evadir las restricciones de acceso a través de trafico manipulado de la red que pr... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0610 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •