Page 14 of 88 results (0.032 seconds)

CVSS: 5.9EPSS: 1%CPEs: 1EXPL: 0

Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port. Cisco IOS contains an unspecified vulnerability that may block further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases, Hypertext Transport Protocol (HTTP) access to the Cisco device. • http://secunia.com/advisories/12395 http://securitytracker.com/id?1011079 http://www.cisco.com/warp/public/707/cisco-sa-20040827-telnet.shtml http://www.kb.cert.org/vuls/id/384230 http://www.securityfocus.com/bid/11060 https://exchange.xforce.ibmcloud.com/vulnerabilities/17131 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cisco IOS 11.1(x) through 11.3(x) and 12.0(x) through 12.2(x), when configured for BGP routing, allows remote attackers to cause a denial of service (device reload) via malformed BGP (1) OPEN or (2) UPDATE messages. Cisco IOS 11.1 (x) a 11.3(x) y 12.0(x) a 12.2(x), cuando se configuran para encaminamiento BGP, permite a atacantes remotos causar una denegación de servicio (recarga de dipositivo) mediante mensajes BGP (1) OPEN o (2) UPDATE malformados. • http://www.cisco.com/warp/public/707/cisco-sa-20040616-bgp.shtml http://www.kb.cert.org/vuls/id/784540 https://exchange.xforce.ibmcloud.com/vulnerabilities/16427 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4948 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in the HTTP server for Cisco IOS 12.2 and earlier allows remote attackers to execute arbitrary code via an extremely long (2GB) HTTP GET request. Desbordamiento de búfer en el servidor HTTP de Cisco IOS 12.2 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante una petición HTTP GET extremadamente larga (2GB). • https://www.exploit-db.com/exploits/77 http://www.cisco.com/warp/public/707/cisco-sn-20030730-ios-2gb-get.shtml http://www.kb.cert.org/vuls/id/579324 •

CVSS: 7.8EPSS: 79%CPEs: 176EXPL: 4

Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full. Cisco IOS 11.x y 12.0 a 12.2 permite a atacantes remotos causar una denegación de servicio (bloqueo de tráfico) enviando una cierta secuencia de paquetes IPv4 a una interfaz del dispositivo, causando que la cola de entrada de ese interfaz sea marcada como llena. • https://www.exploit-db.com/exploits/60 https://www.exploit-db.com/exploits/59 https://www.exploit-db.com/exploits/62 http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006743.html http://www.cert.org/advisories/CA-2003-15.html http://www.cert.org/advisories/CA-2003-17.html http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml http://www.kb.cert.org/vuls/id/411332 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre& • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 2%CPEs: 221EXPL: 1

Buffer overflow in Cisco IOS 11.2.x to 12.0.x allows remote attackers to cause a denial of service and possibly execute commands via a large number of OSPF neighbor announcements. Cisco IOS 11.2.x a 12.0.x permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar comandos mediante un número grande de de anuncios de vecindad OSPF. • https://www.exploit-db.com/exploits/22271 http://marc.info/?l=bugtraq&m=104576100719090&w=2 http://marc.info/?l=bugtraq&m=104587206702715&w=2 http://www.iss.net/security_center/static/11373.php http://www.securityfocus.com/bid/6895 •