7 results (0.004 seconds)

CVSS: 9.0EPSS: 2%CPEs: 120EXPL: 0

31 Jul 2013 — The web framework in Cisco WAAS Software before 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1; Cisco ACNS Software 4.x and 5.x before 5.5.29.2; Cisco ECDS Software 2.x before 2.5.6; Cisco CDS-IS Software 2.x before 2.6.3.b50 and 3.1.x before 3.1.2b54; Cisco VDS-IS Software 3.2.x before 3.2.1.b9; Cisco VDS-SB Software 1.x before 1.1.0-b96; Cisco VDS-OE Software 1.x before 1.0.1; and Cisco VDS-OS Software 1.x in central-management mode allows remote authenticated users to execute arbi... • http://secunia.com/advisories/54367 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

31 May 2011 — The Internet Streamer application in Cisco Content Delivery System (CDS) with software 2.5.7, 2.5.8, and 2.5.9 before build 126 allows remote attackers to cause a denial of service (Web Engine crash) via a crafted URL, aka Bug IDs CSCtg67333 and CSCth25341. La aplicación Internet Streamer de Cisco Content Delivery System (CDS) con software 2.5.7, 2.5.8, y 2.5.9 anteriores a build 126 permite a atacantes remotos provocar una denegación de servicio (caída del motor web o "Web Engine") a través de una URL modi... • http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f18b.shtml • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 79%CPEs: 296EXPL: 2

31 May 2005 — Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 •

CVSS: 7.5EPSS: 3%CPEs: 53EXPL: 0

24 Feb 2005 — The RealServer RealSubscriber on Cisco devices running Application and Content Networking System (ACNS) 5.1 allow remote attackers to cause a denial of service (CPU consumption) via malformed packets. • http://secunia.com/advisories/14395 •

CVSS: 7.5EPSS: 0%CPEs: 53EXPL: 0

24 Feb 2005 — Cisco devices running Application and Content Networking System (ACNS) 5.0, 5.1 before 5.1.13.7, or 5.2 before 5.2.3.9 allow remote attackers to cause a denial of service (bandwidth consumption) via "crafted IP packets" that are continuously forwarded. • http://secunia.com/advisories/14395 •

CVSS: 9.8EPSS: 5%CPEs: 43EXPL: 0

11 Dec 2003 — Buffer overflow in the authentication module for Cisco ACNS 4.x before 4.2.11, and 5.x before 5.0.5, allows remote attackers to execute arbitrary code via a long password. Desbordamiento de búfer en el módulo de autenticación de Cisco ACNS 4.x anteriores a 4.2.11, y 5.x anteriores a 5.0.5, permite a atacantes remotos ejecutar código arbitrario mediante una contraseña larga. • http://secunia.com/advisories/10409 •

CVSS: 7.5EPSS: 0%CPEs: 39EXPL: 0

12 Aug 2002 — The default configuration of the proxy for Cisco Cache Engine and Content Engine allows remote attackers to use HTTPS to make TCP connections to allowed IP addresses while hiding the actual source IP. • http://www.cisco.com/warp/public/707/transparentcache-tcp-relay-vuln-pub.shtml •