-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in Cisco Wireless LAN Controllers
Advisory ID: cisco-sa-20130123-wlc
Revision 1.0
For Public Release 2013 January 23 16:00 UTC (GMT)
- --
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Unified IP Phone Local Kernel System Call Input Validation Vulnerability
Advisory ID: cisco-sa-20130109-uipphone
Revision 1.1
Last Updated 2013 January 17 15:16 UTC (GMT)
For Public Release 2013 January 9 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco ASA 1000V Cloud Firewall H.323 Inspection
Denial of Service Vulnerability
Advisory ID: cisco-sa-20130116-asa1000v
Revision 1.0
For Public Release 2013 January 16 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Prime LAN Management Solution Command Execution Vulnerability
Advisory ID: cisco-sa-20130109-lms
Revision 1.0
For Public Release 2013 January 9 16:00 UTC (GMT)
+-
Summary
?
Any recommendation of IPAM vendors (dual stack) ?
Best Regards
Juan Carlos
Enviado desde mi BlackBerry de Movistar
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http
not manage the local ip pool defined on the Aggregator devices.
According to Google the scan modes used by the IPAM tool are: icmp, snmp
and arp scan.
In my customer, the BRAS are Juniper and the GGSN are Huawei.
I known that Cisco have some MIB to monitor the local ip pool, may be we
can use the same method
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Ironport Appliances Sophos Anti-virus Vulnerabilities
Advisory ID: cisco-sa-20121108-sophos
Revision 1.0
For Public Release 2012 November 9 03:00 UTC (GMT)
- --
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Multiple Vulnerabilities in Cisco Unified
MeetingPlace Web Conferencing
Advisory ID: cisco-sa-20121031-mp
Revision 1.0
For Public Release 2012 October 31 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco Prime Data Center Network Manager Remote
Command Execution Vulnerability
Advisory ID: cisco-sa-20121031-dcnm
Revision 1.0
For Public Release 2012 October 31 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in the Cisco WebEx Recording Format Player
Advisory ID: cisco-sa-20121010-webex
Revision 1.0
For Public Release 2012 October 10 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in Cisco Firewall Services Module
Advisory ID: cisco-sa-20121010-fwsm
Revision 1.0
For Public Release 2012 October 10 16:00 UTC (GMT)
- --
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security
Appliances and Cisco Catalyst 6500 Series ASA Services Module
Advisory ID: cisco-sa-20121010-asa
Revision 1.0
For Public Release 2012 October 10 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Unified Communications Manager Session Initiation Protocol Denial of
Service Vulnerability
Advisory ID: cisco-sa-20120926-cucm
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability
Advisory ID: cisco-sa-20120926-sip
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Malformed Border Gateway Protocol Attribute Vulnerability
Advisory ID: cisco-sa-20120926-bgp
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software DHCP Denial of Service Vulnerability
Advisory ID: cisco-sa-20120926-dhcp
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Intrusion Prevention System Denial of Service Vulnerability
Advisory ID: cisco-sa-20120926-ios-ips
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Catalyst 4500E Series Switch with Cisco Catalyst Supervisor Engine 7L-E
Denial of Service Vulnerability
Advisory ID: cisco-sa-20120926-ecc
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Tunneled Traffic Queue Wedge Vulnerability
Advisory ID: cisco-sa-20120926-c10k-tunnels
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Network Address Translation Vulnerabilities
Advisory ID: cisco-sa-20120926-nat
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software DHCP Version 6 Server Denial of Service Vulnerability
Advisory ID: cisco-sa-20120926-dhcpv6
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Multiple Vulnerabilities in Cisco AnyConnect
Secure Mobility Client
Advisory ID: cisco-sa-20120620-ac
Revision 2.0
Last Updated 2012 September 19 16:01 UTC (GMT)
For Public Release 2012 June 20 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS XR Software Route Processor Denial of Service Vulnerability
Advisory ID: cisco-sa-20120530-iosxr
Revision 2.0
For Public Release 2012 August 15 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch
Advisory ID: cisco-sa-20120711-ctms
Revision 1.0
For Public Release 2012 July 11 16:00 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in Cisco TelePresence Recording Server
Advisory ID: cisco-sa-20120711-ctrs
Revision 1.0
For Public Release 2012 July 11 16:00 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices
Advisory ID: cisco-sa-20120711-cts
Revision 1.0
For Public Release 2012 July 11 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in Cisco TelePresence Manager
Advisory ID: cisco-sa-20120711-ctsman
Revision 1.0
For Public Release 2012 July 11 16:00 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Buffer Overflow Vulnerabilities in the Cisco
WebEx Player
Advisory ID: cisco-sa-20120627-webex
Revision 1.0
For Public Release 2012 June 27 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client
Advisory ID: cisco-sa-20120620-ac
Revision 1.0
For Public Release 2012 June 20 16:00 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS XR Software Route Processor Denial of Service Vulnerability
Advisory ID: cisco-sa-20120530-iosxr
Revision 1.0
For Public Release 2012 May 30 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Buffer Overflow Vulnerabilities in the Cisco
WebEx Player
Advisory ID: cisco-sa-20120404-webex
Revision 1.0
For Public Release 2012 April 4 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Multiple Vulnerabilities in Cisco IOS Software
Traffic Optimization Features
Advisory ID: cisco-sa-20120328-mace
Revision 1.0
For Public Release 2012 March 28 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS Software Network Address Translation
Vulnerability
Advisory ID: cisco-sa-20120328-nat
Revision 1.0
For Public Release 2012 March 28 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS Software RSVP Denial of Service Vulnerability
Advisory ID: cisco-sa-20120328-rsvp
Revision 1.0
For Public Release 2012 March 28 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS Software Zone-Based Firewall Vulnerabilities
Advisory ID: cisco-sa-20120328-zbfw
Revision 1.0
For Public Release 2012 March 28 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco ASA 5500 Series Adaptive Security
Appliance Clientless VPN ActiveX Control Remote Code Execution
Vulnerability
Advisory ID: cisco-sa-20120314-asaclient
Revision 1.0
For Public Release 2012 March 14 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security
Appliances and Cisco Catalyst 6500 Series ASA Services Module
Advisory ID: cisco-sa-20120314-asa
Revision 1.0
For Public Release 2012 March 14 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Firewall Services Module Crafted Protocol Independent Multicast
Message Denial of Service Vulnerability
Advisory ID: cisco-sa-20120314-fwsm
Revision 1.0
For Public Release 2012 March 14 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco Cius Denial of Service Vulnerability
Advisory ID: cisco-sa-20120229-cius
Revision 1.0
For Public Release 2012 February 29 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in Cisco Wireless LAN Controllers
Advisory ID: cisco-sa-20120229-wlc
Revision 1.0
For Public Release 2012 February 29 16:00 UTC (GMT)
Summary
===
The Cisco Wireless LAN Controller (WLC) product family is affected
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Unified Communications Manager Skinny Client Control Protocol
Vulnerabilities
Advisory ID: cisco-sa-20120229-cucm
Revision 1.0
For Public Release 2012 February 29 16:00 UTC (GMT)
Summary
===
Cisco Unified Communications Manager
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco TelePresence Video Communication Server
Session Initiation Protocol Denial of Service Vulnerabilities
Advisory ID: cisco-sa-20120229-vcs
Revision 1.0
For Public Release 2012 February 29 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Small Business SRP 500 Series Multiple Vulnerabilities
Advisory ID: cisco-sa-20120223-srp500
Revision 1.0
For Public Release 2012 February 23 16:00 UTC (GMT)
Summary
===
Cisco Small Business (SRP 500) Series Services Ready Platforms
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco NX-OS Malformed IP Packet Denial of
Service Vulnerability
Advisory ID: cisco-sa-20120215-nxos
Revision 1.0
For Public Release 2012 February 15 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IronPort Appliances Telnet Remote Code
Execution Vulnerability
Advisory ID: cisco-sa-20120126-ironport
Revision 1.0
For Public Release 2012 January 26 17:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Digital Media Manager Privilege Escalation Vulnerability
Advisory ID: cisco-sa-20120118-dmm
Revision 1.0
For Public Release 2012 January 18 16:00 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IP Video Phone E20 Default Root Account
Advisory ID: cisco-sa-20120118-te
Revision 1.0
For Public Release 2012 January 18 16:00 UTC (GMT)
+-
Summary
===
Cisco
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco TelePresence System Integrator C Series and Cisco TelePresence EX Series
Device Default Root Account Manufacturing Error
Advisory ID: cisco-sa-2009-telepresence-c-ex-series
Revision 1.0
For Public Release 2011 November 9 16:00 UTC
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco Small Business SRP500 Series Command
Injection Vulnerability
Advisory ID: cisco-sa-2002-srp500
Revision 1.0
For Public Release 2011 November 2 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Unified Contact Center Express Directory Traversal Vulnerability
Advisory ID: cisco-sa-20111026-uccx
Revision 1.0
For Public Release 2011 October 26 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Denial of Service Vulnerability in Cisco Video Surveillance IP Cameras
Advisory ID: cisco-sa-20111026-camera
Revision 1.0
For Public Release 2011 October 26 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Unified Communications Manager Directory Traversal Vulnerability
Advisory ID: cisco-sa-20111026-cucm
Revision 1.0
For Public Release 2011 October 26 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Buffer Overflow Vulnerabilities in the Cisco WebEx
Player
Advisory ID: cisco-sa-20111026-webex
Revision 1.0
For Public Release 2011 October 26 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco Security Agent Remote Code Execution
Vulnerabilities
Advisory ID: cisco-sa-20111026-csa
Revision 1.0
For Public Release 2011 October 26 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: CiscoWorks Common Services Arbitrary Command Execution
Vulnerability
Advisory ID: cisco-sa-20111019-cs
Revision 1.0
For Public Release 2011 October 19 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco Show and Share Security Vulnerabilities
Advisory ID: cisco-sa-20111019-sns
Revision 1.0
For Public Release 2011 October 19 16:00 UTC (GMT
the config in other routers:
copyhttp://blahblah blah.
no http option when i type: copy ?
any prerequisite config do i need? or what IOS version do the router need?
my router IOS is 12.3(24)
thx
paul
___
cisco-nsp mailing list
cisco
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA 5500
Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA
Services Module
Advisory ID: cisco-sa-20111005-asa
Revision 1.0
For Public Release 2011 October 05 1600 UTC
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Multiple Vulnerabilities in Cisco Firewall
Services Module
Advisory ID: cisco-sa-20111005-fwsm
Revision 1.0
For Public Release 2011 October 05 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Directory Traversal Vulnerability in Cisco
Network Admission Control Manager
Advisory ID: cisco-sa-20111005-nac
Revision 1.0
For Public Release 2011 October 05 1600 UTC (GMT
Greetings,
I have a 6509 with an X6716-10GE Card equipped with Cisco X2-10GB-LX4 10GE
modules and a Cisco 2960S-48TD-L Switch with two Cisco SFP-10G-LRM
modules.
Right now I am not able to get an active link between these X2 and SFP
modules, it stays down/down (notconnected). I instantly get
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS Software IP Service Level
Agreement Vulnerability
Advisory ID: cisco-sa-20110928-ipsla
Revision 1.0
For Public Release 2011 September 28 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco 1 Series Denial of Service
Vulnerability
Advisory ID: cisco-sa-20110928-c10k
Revision 1.0
For Public Release 2011 September 28 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS Software Smart Install Remote Code
Execution Vulnerability
Advisory ID: cisco-sa-20110928-smart-install
Revision 1.0
For Public Release 2011 September 28 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Identity Services Engine Database Default Credentials
Vulnerability
Advisory ID: cisco-sa-20110920-ise
Revision 1.0
For Public Release 2011 September 20 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: CiscoWorks LAN Management Solution Remote
Code Execution Vulnerabilities
Advisory ID: cisco-sa-20110914-lms
Revision 1.0
For Public Release 2011 September 14 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco Unified Service Monitor and Cisco
Unified Operations Manager Remote Code Execution Vulnerabilities
Advisory ID: cisco-sa-20110914-cusm
Revision 1.0
For Public Release 2011 September 14 1600 UTC (GMT
...@greenie.muc.de wrote:
Hi,
On Tue, Sep 06, 2011 at 08:18:01PM -0700, cisco group wrote:
After adding HSRP to our SVI we are no longer receiving data in IP
accounting. I have attached before and after configs. Is anyone able
to indicate what would be causing this? Is it CEF related
Thanks for all your help Gert. Extremely appreciated.
Cheers,
On Sep 7, 6:19 pm, Gert Doering g...@greenie.muc.de wrote:
Hi,
On Wed, Sep 07, 2011 at 01:29:42AM -0700, cisco group wrote:
Thanks for the input will start researching a netflow solution. Would
you look at virtualised solution
10.0.2.1 secondary
standby 9 priority 120
standby 9 preempt delay minimum 60 sync 60
standby 9 authentication ...
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Denial of Service Vulnerability in Cisco
TelePresence Codecs
Advisory ID: cisco-sa-20110831-tandberg
Revision 1.0
For Public Release 2011 August 31 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Apache HTTPd Range Header Denial of Service
Vulnerability
Advisory ID: cisco-sa-20110830-apache
Revision 1.0
For Public Release 2011 August 30 1600 UTC (GMT)
Summary
===
The Apache HTTPd server contains a denial
Hello QoS experts,
I am thinking about the best practice to feed some low bandwitdh 4 Mb/s
Ethernet over SDH links from a Cisco 6500/Sup720 with SXI IOS.
The carrier equipment has 100Base-TX ports, does no noticable
queuing/shaping and aggressively drops everything over 4096 kb/s
looked around on the cisco site and have found procedures for
upgrading IOS on redundant supervisors but am unable to find
procedures on upgrading supervisor engines themselves?
Can anyone point me in the right direction?
Thank You
Switch#show module
Mod Ports Card Type
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Denial of Service Vulnerabilities in Cisco
Intercompany Media Engine
Advisory ID: cisco-sa-20110824-ime
Revision 1.0
For Public Release 2011 August 24 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Open Query Interface in Cisco Unified
Communications Manager and Cisco Unified Presence Server
Advisory ID: cisco-sa-20110824-cucm-cups
Revision 1.0
For Public Release 2011 August 24 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco Unified Communications Manager Denial
of Service Vulnerabilities
Advisory ID: cisco-sa-20110824-cucm
Revision 1.0
For Public Release 2011 August 24 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco TelePresence Recording Server Default
Credentials for Root Account Vulnerability
Advisory ID: cisco-sa-20110729-tp
Revision 1.0
For Public Release 2011 July 29 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco ASR 9000 Series Routers Line Card IP Version 4
Denial of Service Vulnerability
Advisory ID: cisco-sa-20110720-asr9k
Revision 1.0
For Public Release 2011 July 20 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco SA 500 Series Security Appliances Web Management
Interface Vulnerabilities
Advisory ID: cisco-sa-20110720-sa500
Revision 1.0
For Public Release 2011 July 20 1600 UTC (GMT
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
-3C
Best Regards
JC
On Sun, Jul 17, 2011 at 2:17 PM, Gert Doering g...@greenie.muc.de wrote:
Hi,
On Sun, Jul 17, 2011 at 01:38:16PM -0500, cisco-pe wrote:
Is it possible to use two different supervisor in one 7609? (WS-720-3B
and
RSP 720-3C)
At this moment we are using a number of 7609
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco Content Services Gateway Denial of
Service Vulnerability
Advisory ID: cisco-sa-20110706-csg
Revision 1.0
For Public Release 2011 July 06 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Default Credentials Vulnerability in Cisco
Network Registrar
Advisory ID: cisco-sa-20110601-cnr
Revision 1.0
For Public Release 2011 June 01 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Multiple Vulnerabilities in Cisco Unified IP
Phones 7900 Series
Advisory ID: cisco-sa-20110601-phone
Revision 1.0
For Public Release 2011 June 1 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Default Credentials for root Account on the
Cisco Media Experience Engine 5600
Advisory ID: cisco-sa-20110601-mxe
Revision 1.0
For Public Release 2011 June 01 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Multiple Vulnerabilities in Cisco AnyConnect
Secure Mobility Client
Advisory ID: cisco-sa-20110601-ac
Revision 1.0
For Public Release 2011 June 01 1600 UTC (GMT
the Cisco recommendations.
I dont know if the typical bank transactions using Internet could be
affected during the cut of services.
2. With inter-chassis fail-over you have to relay on routing protocols
convergence and ability to trigger routing convergence if only the CGSE card
fails
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco RVS4000 and WRVS4400N Web Management
Interface Vulnerabilities
Advisory ID: cisco-sa-20110525-rvs4000
Revision 1.0
For Public Release 2011 May 25 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS XR Software IP Packet
Vulnerability
Advisory ID: cisco-sa-20110525-iosxr
Revision 1.0
For Public Release 2011 May 25 1600 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco XR 12000 Series Shared Port Adapters
Interface Processor Vulnerability
Advisory ID: cisco-sa-20110525-iosxrspa
Revision 1.0
For Public Release 2011 May 25 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS XR Software SSHv1 Denial of Service
Vulnerability
Advisory ID: cisco-sa-20110525-iosxr-ssh
Revision 1.0
For Public Release 2011 May 25 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco Wireless LAN Controllers Denial of
Service Vulnerability
Document ID: 112916
Advisory ID: cisco-sa-20110427-wlc
Revision 1.0
For Public Release 2011 April 27 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Multiple Vulnerabilities in Cisco Unified
Communications Manager
Document ID: 112878
Advisory ID: cisco-sa-20110427-cucm
Revision 1.0
For Public Release 2011 April 27 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco Network Access Control Guest Server
System Software Authentication Bypass Vulnerability
Advisory ID: cisco-sa-20110330-nac
Revison 1.0
For Public Release 2011 March 30 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco Secure Access Control System Unauthorized
Password Change Vulnerability
Advisory ID: cisco-sa-20110330-acs
Revision 1.0
For Public Release 2011 March 30 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco PSIRT regularly discloses vulnerabilities in Cisco IOS Software on
the fourth Wednesday in March and September via the Cisco IOS Security
Advisory bundle. The next bundled disclosure was planned for Wednesday,
March 23, 2011, but Cisco
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Multiple Vulnerabilities in Cisco
TelePresence Multipoint Switch
Advisory ID: cisco-sa-20110223-telepresence-ctms
Revision 1.0
For Public Release 2011 February 23
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Multiple Vulnerabilities in Cisco
TelePresence Recording Server
Advisory ID: cisco-sa-20110223-telepresence-ctrs
Revision 1.0
For Public Release 2011 February 23 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA 5500
Series Adaptive Security Appliances
Advisory ID: cisco-sa-20110223-asa
Revision 1.0
For Public Release 2011 February 23 1600 UTC (GMT
901 - 1000 of 1125 matches
Mail list logo