Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2005-05-31 |
Product | Support Tools | Last view | 2005-05-31 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:cisco:support_tools:*:*:*:*:*:*:*:* | 1 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5 | 2005-05-31 | CVE-2005-0356 | Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
16685 | Multiple Vendor Malformed TCP Timestamp DoS |
OpenVAS Exploits
id | Description |
---|---|
2008-09-04 | Name : FreeBSD Security Advisory (FreeBSD-SA-05:15.tcp.asc) File : nvt/freebsdsa_tcp1.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2014-10-10 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL4743.nasl - Type: ACT_GATHER_INFO |