Page 72 of 505 results (0.011 seconds)

CVSS: 5.4EPSS: 2%CPEs: 15EXPL: 0

Cisco IOS 12.0(32)S12 through 12.0(32)S13 and 12.0(33)S3 through 12.0(33)S4, 12.0(32)SY8 through 12.0(32)SY9, 12.2(33)SXI1 through 12.2(33)SXI2, 12.2XNC before 12.2(33)XNC2, 12.2XND before 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 through 2.3.1t and 2.4 through 2.4.0; when RFC4893 BGP routing is enabled, allows remote attackers to cause a denial of service (device reload) by using an RFC4271 peer to send a malformed update, aka Bug ID CSCta33973. Cisco IOS v12.0(32)S12 hasta v12.0(32)S13 y v12.0(33)S3 hasta v12.0(33)S4, v12.0(32)SY8 hasta v12.0(32)SY9, v12.2(33)SXI1 hasta v12.2(33)SXI2, v12.2XNC hasta v12.2(33)XNC2, v12.2XND hasta v12.2(33)XND1, y v12.4(24)T1; y IOS XE v2.3 hasta v2.3.1t y v2.4 hasta v2.4.0; cuando el enrutado RFC4893 BGP está habilitado, lo que permite a los atacantes remoto causar una denegación de servicio (recarga del dispositivo) usando un par RFC4271 para enviar una actualización malformado, también conocido como Bud ID CSCta33973. • http://secunia.com/advisories/36046 http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml http://www.securityfocus.com/bid/35860 http://www.securitytracker.com/id?1022619 http://www.vupen.com/english/advisories/2009/2082 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6853 • CWE-16: Configuration •

CVSS: 4.3EPSS: 1%CPEs: 2EXPL: 2

Cross-site scripting (XSS) vulnerability in +webvpn+/index.html in WebVPN on the Cisco Adaptive Security Appliances (ASA) 5520 with software 7.2(4)30 and earlier 7.2 versions including 7.2(2)22, and 8.0(4)28 and earlier 8.0 versions, when clientless mode is enabled, allows remote attackers to inject arbitrary web script or HTML via the Host HTTP header. Una vulnerabilidad de tipo cross-site scripting (XSS) en archivo +webvpn+/index.html en el WebVPN en los Adaptive Security Appliances (ASA) 5520 de Cisco con el software versiones 7.2(4)30 y anteriores a 7.2 incluyendo 7.2(2)22, y versiones 8.0(4)28 y anteriores a 8.0, cuando el modo clientless está habilitado, permite a los atacantes remotos inyectar script web o HTML arbitrario por medio del encabezado HTTP Host. • https://www.exploit-db.com/exploits/32878 http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0478.html http://tools.cisco.com/security/center/viewAlert.x?alertId=17950 http://www.securityfocus.com/archive/1/502313/100/0/threaded http://www.securityfocus.com/archive/1/502932 http://www.securityfocus.com/bid/34307 http://www.securitytracker.com/id?1022122 http://www.vupen.com/english/advisories/2009/1169 https://exchange.xforce.ibmcloud.com/vulnerabilities/49528 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.1EPSS: 2%CPEs: 310EXPL: 0

The (1) Cisco Unified Communications Manager Express; (2) SIP Gateway Signaling Support Over Transport Layer Security (TLS) Transport; (3) Secure Signaling and Media Encryption; (4) Blocks Extensible Exchange Protocol (BEEP); (5) Network Admission Control HTTP Authentication Proxy; (6) Per-user URL Redirect for EAPoUDP, Dot1x, and MAC Authentication Bypass; (7) Distributed Director with HTTP Redirects; and (8) TCP DNS features in Cisco IOS 12.0 through 12.4 do not properly handle IP sockets, which allows remote attackers to cause a denial of service (outage or resource consumption) via a series of crafted TCP packets. Las funcionalidades (1) Cisco Unified Communications Manager Express; (2) el soporte de Transport Layer Security (TLS) para SIP Gateway Signaling; (3) Secure Signaling y Media Encryption; (4) Blocks Extensible Exchange Protocol (BEEP); (5) Network Admission Control HTTP Authentication Proxy; (6) Per-user URL Redirect para EAPoUDP, Dot1x, y la integración de autenticación MAC; (7) Distributed Director con HTTP Redirects; y (8) TCP DNS en Cisco IOS v12.0 hasta 12.4 no maneja adecuadamente los "sockets", permitiendo a atacantes remotos provocar una denegación de servicio (apagado o consumo de recursos) mediante una serie de paquetes TCP manipulados. • http://secunia.com/advisories/34438 http://securitytracker.com/id?1021897 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c6.shtml http://www.securityfocus.com/bid/34242 http://www.vupen.com/english/advisories/2009/0851 https://exchange.xforce.ibmcloud.com/vulnerabilities/49418 •

CVSS: 7.8EPSS: 2%CPEs: 310EXPL: 0

Unspecified vulnerability in Cisco IOS 12.0 through 12.4, when configured with (1) IP Service Level Agreements (SLAs) Responder, (2) Session Initiation Protocol (SIP), (3) H.323 Annex E Call Signaling Transport, or (4) Media Gateway Control Protocol (MGCP) allows remote attackers to cause a denial of service (blocked input queue on the inbound interface) via a crafted UDP packet. Vulnerabilidad no especificada en Cisco IOS v12.0 hasta v12.4, cuando se ha configurado con (1) IP Service Level Agreements (SLAs) Responder, (2) Session Initiation Protocol (SIP), (3) H.323 Annex E Call Signaling Transport, o (4) Media Gateway Control Protocol (MGCP) permite a atacantes remotos provocar una denegación de servicio (bloqueo de entrada a la cola en el interfaz de entrada) mediante un paquete UDP manipulado. • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90426.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.securityfocus.com/bid/34245 http://www.securitytracker.com/id?1021904 https://exchange.xforce.ibmcloud.com/vulnerabilities/49419 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6720 •

CVSS: 7.8EPSS: 2%CPEs: 310EXPL: 0

Unspecified vulnerability in Cisco IOS 12.0 through 12.4, when SIP voice services are enabled, allows remote attackers to cause a denial of service (device crash) via a valid SIP message. Vulnerabilidad no especificada en Cisco IOS v12.0 hasta v12.4, cuando están habilitados los servicios de voz SIP, permite a atacantes remotos provocar una denegación de servicio (caída del dispositivo) mediante un mensaje SIP válido. • http://secunia.com/advisories/34438 http://securitytracker.com/id?1021902 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c0.shtml http://www.securityfocus.com/bid/34243 http://www.vupen.com/english/advisories/2009/0851 https://exchange.xforce.ibmcloud.com/vulnerabilities/49421 •