
CVE-2013-5534
https://notcve.org/view.php?id=CVE-2013-5534
19 Oct 2013 — Directory traversal vulnerability in the attachment service in the Voice Message Web Service (aka VMWS or Cisco Unity Web Service) in Cisco Unity Connection allows remote authenticated users to create files, and consequently execute arbitrary JSP code, via a crafted pathname for a file that is not a valid audio file, aka Bug ID CSCuj22948. Vulnerabilidad de salto de directorio en el servicio de adjuntos en el Voice Message Web Service (también conocido como VMWS o Cisco Unity Web Service) en Cisco Unity Con... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5534 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2013-1129
https://notcve.org/view.php?id=CVE-2013-1129
19 Feb 2013 — Memory leak in Cisco Unity Connection 9.x allows remote attackers to cause a denial of service (memory consumption and process crash) by sending many TCP requests, aka Bug ID CSCud59736. Pérdida de memoria en Cisco Unity Connection v9.x que permite ataques remotos que provocan una denegación de servicios (consumo de memoria y caída de procesos) mediante el envío de muchas solicitudes TPC, ID del error CSCud59736. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1129 • CWE-399: Resource Management Errors •

CVE-2012-3060
https://notcve.org/view.php?id=CVE-2012-3060
16 Sep 2012 — Cisco Unity Connection (UC) 8.6, 9.0, and 9.5 allows remote attackers to cause a denial of service (CPU consumption) via malformed UDP packets, aka Bug ID CSCtz76269. Cisco Unity Connection (UC) v8.6, 9.0, y v9.5 permite a los atacantes remotos a provocar una denegación de servicio (consumo de CPU) a través de paquetes UDP manipulados también conocido como Bug ID CSCtz76269. • http://www.cisco.com/web/software/282074295/93949/cucm-readme-862asu2-Rev2.pdf • CWE-399: Resource Management Errors •

CVE-2012-3096
https://notcve.org/view.php?id=CVE-2012-3096
16 Sep 2012 — Cisco Unity Connection (UC) 7.1, 8.0, and 8.5 allows remote authenticated users to cause a denial of service (resource consumption and administration outage) via extended use of the product, aka Bug ID CSCtd79132. Cisco Unity Connection (UC) v7.1, v8.0, y v8.5 permite a usuarios remotos autenticados provocar una denegación de servicio (consumo de recursos y caída de administración) a través del uso extendido del producto, tambien conocido como Bug ID CSCtd79132. • http://www.cisco.com/en/US/docs/voice_ip_comm/connection/7x/release/notes/715cucrn.html •

CVE-2012-0366
https://notcve.org/view.php?id=CVE-2012-0366
01 Mar 2012 — Cisco Unity Connection before 7.1.3b(Su2) allows remote authenticated users to change the administrative password by leveraging the Help Desk Administrator role, aka Bug ID CSCtd45141. Cisco Unity Connection anteriores a v7.1.3b(Su2) permite a usuarios remotos autenticados a cambiar la contraseña de administración by aprovechando el rol de Help Desk Administrator, también conocido como Bug ID CSCtd45141. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cuc • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2012-0367
https://notcve.org/view.php?id=CVE-2012-0367
01 Mar 2012 — Cisco Unity Connection before 7.1.5b(Su5), 8.0 and 8.5 before 8.5.1(Su3), and 8.6 before 8.6.2 allows remote attackers to cause a denial of service (services crash) via a series of crafted TCP segments, aka Bug ID CSCtq67899. Cisco Unity Connection anteriores a v7.1.5b(Su5), v8.0 y 8.5 anteriores a v8.5.1(Su3), y v8.6 anteriores a v8.6.2 permite a atacantes remotos provocar una denegación de servicio (caída de servicios) a través de una serie de segmentos TCP manipulados, también conocido como Bug ID CSCtq6... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cuc • CWE-399: Resource Management Errors •

CVE-2005-0356 – TCP TIMESTAMPS - Denial of Service
https://notcve.org/view.php?id=CVE-2005-0356
31 May 2005 — Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 •