4 results (0.002 seconds)

CVSS: 7.5EPSS: 80%CPEs: 296EXPL: 2

31 May 2005 — Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 •

CVSS: 9.8EPSS: 0%CPEs: 11EXPL: 0

15 Dec 2004 — Cisco Unity 2.x, 3.x, and 4.x, when integrated with Microsoft Exchange, has several hard coded usernames and passwords, which allows remote attackers to gain unauthorized access and change configuration settings or read outgoing or incoming e-mail messages. • http://www.ciac.org/ciac/bulletins/p-060.shtml •

CVSS: 9.8EPSS: 0%CPEs: 8EXPL: 0

15 Oct 2002 — Cisco Unity 2.x and 3.x uses well-known default user accounts, which could allow remote attackers to gain access and place arbitrary calls. • http://www.cisco.com/warp/public/707/toll-fraud-pub.shtml •

CVSS: 6.5EPSS: 0%CPEs: 8EXPL: 0

11 Oct 2002 — The default configuration of Cisco Unity 2.x and 3.x does not block international operator calls in the predefined restriction tables, which could allow authenticated users to place international calls using call forwarding. La configuración por defecto de Cisco Unity 2.x y 3.x no bloquea llamadas internacioneles con operados, lo que podría permitir a usuarios autenticados hacer llamadas internacionales usando desvío (forwarding) de llamadas. • http://www.cisco.com/warp/public/707/toll-fraud-pub.shtml •