Page 61 of 328 results (0.008 seconds)

CVSS: 5.0EPSS: 36%CPEs: 2EXPL: 1

Unspecified vulnerability in the Cisco IP Phone 7940 and 7960 running firmware before POS8-6-0 allows remote attackers to cause a denial of service via the Remote-Party-ID sipURI field in a SIP INVITE request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad no especificada en el teléfono Cisco IP Phone 7940 y 7960 ejecutando el software empotrado (firmware) anterior a POS8-6-0 permite a atacantes remotos provocar una denegación de servicio a través del campo Remote-Party-ID sipURI en una petición SIP INVITE. NOTA: la procedencia de esta información es desconocida; los detalles se han obtenido exclusivamente de información de terceros. • https://www.exploit-db.com/exploits/3526 http://secunia.com/advisories/24600 http://www.cisco.com/en/US/products/products_security_response09186a00808075ad.html http://www.securityfocus.com/bid/23047 http://www.securitytracker.com/id?1017797 http://www.vupen.com/english/advisories/2007/1023 https://exchange.xforce.ibmcloud.com/vulnerabilities/33098 •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 0

The default configuration of IOS HTTP server in Cisco Router Web Setup (CRWS) before 3.3.0 build 31 does not require credentials, which allows remote attackers to access the server with arbitrary privilege levels, aka bug CSCsa78190. La configuración por defecto en el servidor IOS HTTP en Cisco Router Web Setup (CRWS) anterior a 3.3.0 construcción 31 no requiere credenciales, lo cual permite a atacantes remotos acceder al servidor con niveles de privielgio de su elección, también conocido como fallo CSCsa78190. • http://secunia.com/advisories/21028 http://securitytracker.com/id?1016476 http://www.cisco.com/warp/public/707/cisco-sa-20060712-crws.shtml http://www.kb.cert.org/vuls/id/205225 http://www.osvdb.org/27159 http://www.securityfocus.com/bid/18953 http://www.vupen.com/english/advisories/2006/2773 https://exchange.xforce.ibmcloud.com/vulnerabilities/27688 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5826 •

CVSS: 5.0EPSS: 93%CPEs: 296EXPL: 2

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64/SCOSA-2005.64.txt http://secunia.com/advisories/15393 http://secunia.com/advisories/15417 http://secunia.com/advisories/18222 http://secunia.com/advisories/18662 http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml http:/& •

CVSS: 5.0EPSS: 0%CPEs: 53EXPL: 0

Cisco devices running Application and Content Networking System (ACNS) 5.0, 5.1 before 5.1.13.7, or 5.2 before 5.2.3.9 allow remote attackers to cause a denial of service (bandwidth consumption) via "crafted IP packets" that are continuously forwarded. • http://secunia.com/advisories/14395 http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml http://www.securityfocus.com/bid/12648 https://exchange.xforce.ibmcloud.com/vulnerabilities/19470 •

CVSS: 5.0EPSS: 1%CPEs: 53EXPL: 0

The RealServer RealSubscriber on Cisco devices running Application and Content Networking System (ACNS) 5.1 allow remote attackers to cause a denial of service (CPU consumption) via malformed packets. • http://secunia.com/advisories/14395 http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml http://www.kb.cert.org/vuls/id/579240 http://www.securityfocus.com/bid/12648 https://exchange.xforce.ibmcloud.com/vulnerabilities/19469 •