Page 8 of 123 results (0.007 seconds)

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

18 Sep 2016 — The Data in Motion (DMo) application in Cisco IOS 15.6(1)T and IOS XE, when the IOx feature set is enabled, allows remote attackers to cause a denial of service via a crafted packet, aka Bug IDs CSCuy82904, CSCuy82909, and CSCuy82912. La aplicación Data in Motion (DMo) en Cisco IOS 15.6(1)T e IOS XE, cuando el conjunto de características IOx está activado, permite a atacantes remotos provocar una denegación de servicio a través de un paquete manipulado, vulnerabilidad también conocida como Bug IDs CSCuy8290... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-ios-xe • CWE-399: Resource Management Errors •

CVSS: 5.3EPSS: 0%CPEs: 45EXPL: 0

17 Jul 2016 — Cisco IOS 12.4 and 15.0 through 15.5 and IOS XE 3.13 through 3.17 allow remote authenticated users to cause a denial of service (device reload) via crafted attributes in a BGP message, aka Bug ID CSCuz21061. Cisco IOS 12.4 y 15.0 hasta la versión 15.5 y IOS XE 3.13 hasta la versión 3.17 permiten a usuarios remotos autenticados provocar una denegación de servicio (reinicio de dispositivo) a través de atributos manipulados en un mensaje BGP, también conocido como Bug ID CSCuz21061. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160715-bgp • CWE-399: Resource Management Errors •

CVSS: 6.8EPSS: 0%CPEs: 3EXPL: 0

23 Jun 2016 — Double free vulnerability in Cisco IOS XE 3.15S, 3.16S, and 3.17S allows remote authenticated users to cause a denial of service (device restart) via a sequence of crafted SNMP read requests, aka Bug ID CSCux13174. Vulnerabilidad de liberación doble en Cisco IOS XE 3.15S, 3.16S y 3.17S permite a usuarios remotos autenticados causar una denegación de servicio (reinicio de dispositivo) a través de una secuencia de peticiones de lectura SNMP manipuladas, también conocido como Bug ID CSCux13174. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-iosxe • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 2%CPEs: 4891EXPL: 0

29 May 2016 — The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Cisco IOS XE 2.1 through 3.17S, IOS XR 2.0.0 through 5.3.2, and NX-OS allows remote attackers to cause a denial of service (packet-processing outage) via crafted ND messages, aka Bug ID CSCuz66542, as exploited in the wild in May 2016. El protocolo de implementación Neighbor Discovery (ND) en la pila IPv6 en Cisco IOS XE 2.1 hasta la versión 3.17S, IOS XR 2.0.0 hasta la versión 5.3.2 y NX-OS permite a atacantes remotos provocar una den... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160525-ipv6 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 187EXPL: 0

20 Apr 2016 — The NTP implementation in Cisco IOS 15.1 and 15.5 and IOS XE 3.2 through 3.17 allows remote attackers to modify the system time via crafted packets, aka Bug ID CSCux46898. La implementación NTP en Cisco IOS 15.1 y 15.5 y IOS XE 3.2 hasta la versión 3.17 permite a atacantes remotos modicar el tiempo del sistema a través de paquetes manipulados, también conocido como Bug ID CSCux46898. • http://www.securityfocus.com/bid/86685 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.1EPSS: 4%CPEs: 108EXPL: 0

26 Mar 2016 — The IKEv2 implementation in Cisco IOS 15.0 through 15.6 and IOS XE 3.3 through 3.17 allows remote attackers to cause a denial of service (device reload) via fragmented packets, aka Bug ID CSCux38417. La implementación de IKEv2 en Cisco IOS hasta la versión 15.6 y IOS XE 3.3 hasta la versión 3.17 permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de paquetes fragmentados, también conocido como Bug ID CSCux38417. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-ios-ikev2 • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 0%CPEs: 10EXPL: 0

16 Feb 2015 — Race condition in the Common Classification Engine (CCE) in the Measurement, Aggregation, and Correlation Engine (MACE) implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCuj96752. Condición de carrera en Common Classification Engine (CCE) en la implamantación Measurement, Aggregation, and... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0609 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

12 Feb 2015 — The Zone-Based Firewall implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers incorrect kernel-timer handling, aka Bug ID CSCuh25672. La implementación Zone-Based Firewall en Cisco IOS 15.4(2)T3 y anteriores permite a atacantes remotos causar una denegación de servicio (recarga del dispositivo) a través de trafico manipulado de la red que provoca el manejo incorrecto del temperizador del kernel, tambié... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0592 • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 0%CPEs: 10EXPL: 0

12 Feb 2015 — Race condition in the Measurement, Aggregation, and Correlation Engine (MACE) implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCul48736. Condición de carrera en la implementación Measurement, Aggregation, y Correlation Engine (MACE) en Cisco IOS 15.4(2)T3 y anteriores permite a atacantes... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0608 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 5.9EPSS: 0%CPEs: 4EXPL: 0

12 Feb 2015 — Race condition in the object-group ACL feature in Cisco IOS 15.5(2)T and earlier allows remote attackers to bypass intended access restrictions via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCun21071. Condición de carrera en la característica object-group ACL en Cisco IOS 15.5(2)T y anteriores permite a atacantes remotos evadir las restricciones de acceso a través de trafico manipulado de la red que pr... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0610 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •