4 results (0.018 seconds)

CVSS: 7.8EPSS: 7%CPEs: 188EXPL: 0

Cisco IOS 12.4 and earlier, when using the crypto packages and SSL support is enabled, allows remote attackers to cause a denial of service via a malformed (1) ClientHello, (2) ChangeCipherSpec, or (3) Finished message during an SSL session. Cisco IOS 12.4 y anteriores, cuando utilizan paquetes de cifrado y el soporte SSL está habilitado, permite a atacantes remotos provocar una denegación de servicio mediante mensajes (1) ClientHello, (2) ChangeCipherSpec, o (3) Finished durante una sesión SSL. • http://secunia.com/advisories/25361 http://www.cisco.com/en/US/products/products_security_advisory09186a0080847c49.shtml http://www.osvdb.org/35339 http://www.securityfocus.com/bid/24097 http://www.securitytracker.com/id?1018094 http://www.vupen.com/english/advisories/2007/1910 https://exchange.xforce.ibmcloud.com/vulnerabilities/34432 https://exchange.xforce.ibmcloud.com/vulnerabilities/34436 https://exchange.xforce.ibmcloud.com/vulnerabilities/34442 https://oval.cisecurity.org/repository/search/def •

CVSS: 7.8EPSS: 5%CPEs: 253EXPL: 0

Cisco IOS allows remote attackers to cause a denial of service (crash) via a crafted IPv6 Type 0 Routing header. Cisco IOS permite a atacantes remotos provocar una denegación de servicio (caída) mediante una cabecera manipulada de IPv6 Type 0 Routing. • http://osvdb.org/32091 http://secunia.com/advisories/23867 http://securitytracker.com/id?1017550 http://www.cisco.com/en/US/products/products_security_advisory09186a00807cb0fd.shtml http://www.kb.cert.org/vuls/id/274760 http://www.securityfocus.com/bid/22210 http://www.us-cert.gov/cas/techalerts/TA07-024A.html http://www.vupen.com/english/advisories/2007/0329 https://exchange.xforce.ibmcloud.com/vulnerabilities/31715 https://oval.cisecurity.org/repository/search/definition/oval%3Ao •

CVSS: 10.0EPSS: 21%CPEs: 253EXPL: 0

Cisco IOS 9.x, 10.x, 11.x, and 12.x and IOS XR 2.0.x, 3.0.x, and 3.2.x allows remote attackers to cause a denial of service or execute arbitrary code via a crafted IP option in the IP header in a (1) ICMP, (2) PIMv2, (3) PGM, or (4) URD packet. Cisco IOS 9.x, 10.x, 11.x y 12.x y IOS XR 2.0.x, 3.0.x y 3.2.x permite a atacantes remotos provocar una denegación de servicio o ejecutar código de su elección mediante la manipulación de la opción IP en la cabecera IP de los paquetes 1) ICMP, (2) PIMv2, (3) PGM o (4) URD. • http://osvdb.org/32092 http://secunia.com/advisories/23867 http://securitytracker.com/id?1017555 http://www.cisco.com/en/US/products/products_security_advisory09186a00807cb157.shtml http://www.kb.cert.org/vuls/id/341288 http://www.securityfocus.com/bid/22211 http://www.us-cert.gov/cas/techalerts/TA07-024A.html http://www.vupen.com/english/advisories/2007/0329 https://exchange.xforce.ibmcloud.com/vulnerabilities/31725 https://oval.cisecurity.org/repository/search/definition/oval%3Ao •

CVSS: 7.8EPSS: 5%CPEs: 253EXPL: 0

Memory leak in the TCP listener in Cisco IOS 9.x, 10.x, 11.x, and 12.x allows remote attackers to cause a denial of service by sending crafted TCP traffic to an IPv4 address on the IOS device. Agujero de memoria en el oyente TCP de Cisco IOS 9.x, 10.x, 11.x y 12.x permite a atacantes remotos provocar una denegación de servicio mediante el envío de tráfico TCP manipulado a la dirección IPv4 en el dispositivo IOS. • http://osvdb.org/32093 http://secunia.com/advisories/23867 http://securitytracker.com/id?1017551 http://www.cisco.com/en/US/products/products_security_advisory09186a00807cb0e4.shtml http://www.kb.cert.org/vuls/id/217912 http://www.securityfocus.com/bid/22208 http://www.us-cert.gov/cas/techalerts/TA07-024A.html http://www.vupen.com/english/advisories/2007/0329 https://exchange.xforce.ibmcloud.com/vulnerabilities/31716 https://oval.cisecurity.org/repository/search/definition/oval%3Ao •