Page 81 of 456 results (0.005 seconds)

CVSS: 7.5EPSS: 7%CPEs: 10EXPL: 0

Multiple vulnerabilities in the H.323 protocol implementation for Cisco IOS 11.3T through 12.2T allow remote attackers to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol. Múltiples vulnerabilidades en la implementación del protocolo H.323 de Cisco IOS 11.3T a 12.2T permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario, como se ha demostrado por el bloque de pruebas NISCC/OUSPG PROTOS para el protocolo H.225. • http://www.cert.org/advisories/CA-2004-01.html http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml http://www.kb.cert.org/vuls/id/749342 http://www.securityfocus.com/bid/9406 http://www.securitytracker.com/id?1008685 http://www.uniras.gov.uk/vuls/2004/006489/h323.htm https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4884 •

CVSS: 9.3EPSS: 0%CPEs: 12EXPL: 0

Cisco IOS 12.0 through 12.2, when IP routing is disabled, accepts false ICMP redirect messages, which allows remote attackers to cause a denial of service (network routing modification). • http://archives.neohapsis.com/archives/bugtraq/2003-02/0131.html http://securitytracker.com/id?1006075 http://www.securityfocus.com/bid/6823 https://exchange.xforce.ibmcloud.com/vulnerabilities/11306 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 4%CPEs: 75EXPL: 1

The Session Initiation Protocol (SIP) implementation in multiple Cisco products including IP Phone models 7940 and 7960, IOS versions in the 12.2 train, and Secure PIX 5.2.9 to 6.2.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite. • http://www.cert.org/advisories/CA-2003-06.html http://www.cisco.com/warp/public/707/cisco-sa-20030221-protos.shtml http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip http://www.kb.cert.org/vuls/id/528719 http://www.securityfocus.com/bid/6904 http://www.securitytracker.com/id?1006143 http://www.securitytracker.com/id?1006144 http://www.securitytracker.com/id?1006145 https://exchange.xforce.ibmcloud.com/vulnerabilities/11379 •

CVSS: 5.0EPSS: 15%CPEs: 39EXPL: 0

OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recursion) via malformed ASN.1 sequences. OpenSSL 0.9.6k, cuando se ejecuta en Windows, permite a atacantes remotos causar una denegación de servicio (caída por recursión excesiva) mediante secuencias ASN.1 malformadas. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-003.txt.asc ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc http://marc.info/?l=bugtraq&m=106796246511667&w=2 http://marc.info/?l=bugtraq&m=108403850228012&w=2 http://rhn.redhat.com/errata/RHSA-2004-119.html http://secunia.com/advisories/17381 http://www.cisco.com/warp/public/707/cisco-sa-20030930-ssl.shtml http://www.kb.cert.org/vuls/id/412478 http://www.openssl.or •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in the HTTP server for Cisco IOS 12.2 and earlier allows remote attackers to execute arbitrary code via an extremely long (2GB) HTTP GET request. Desbordamiento de búfer en el servidor HTTP de Cisco IOS 12.2 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante una petición HTTP GET extremadamente larga (2GB). • https://www.exploit-db.com/exploits/77 http://www.cisco.com/warp/public/707/cisco-sn-20030730-ios-2gb-get.shtml http://www.kb.cert.org/vuls/id/579324 •