![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-2587
https://notcve.org/view.php?id=CVE-2007-2587
09 May 2007 — The IOS FTP Server in Cisco IOS 11.3 through 12.4 allows remote authenticated users to cause a denial of service (IOS reload) via unspecified vectors involving transferring files (aka bug ID CSCse29244). El servidor FTP IOS en Cisco IOS 11.3 hasta 12.4 permite a usuarios remotos autenticados provocar una denegación de servicio (recarga de IOS) mediante vectores no especificados involucrando transferencia de ficheros (también conocido como bug ID CSCse29244). • http://secunia.com/advisories/25199 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-2586 – Cisco IOS 12.3(18) (FTP Server) - Remote (Attached to GDB)
https://notcve.org/view.php?id=CVE-2007-2586
09 May 2007 — The FTP Server in Cisco IOS 11.3 through 12.4 does not properly check user authorization, which allows remote attackers to execute arbitrary code, and have other impact including reading startup-config, as demonstrated by a crafted MKD command that involves access to a VTY device and overflows a buffer, aka bug ID CSCek55259. El servidor FTP en Cisco IOS versiones 11.3 hasta 12.4, no comprueba apropiadamente la autorización del usuario, lo que permite a atacantes remotos ejecutar código arbitrario, y tener ... • https://www.exploit-db.com/exploits/6155 • CWE-863: Incorrect Authorization •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-0648
https://notcve.org/view.php?id=CVE-2007-0648
01 Feb 2007 — Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP. Cisco IOS después de las versiones 12.3(14)T, 12.3(8)YC1, 12.3(8)YG y 12.4, con soporte de voz y sin el Session Initiated Protocol (SIP) configurado, permite a atacantes remotos provocar una denegación de servicio (caída) mediante el envío de un paquete manipulado al p... • http://secunia.com/advisories/23978 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-0480
https://notcve.org/view.php?id=CVE-2007-0480
25 Jan 2007 — Cisco IOS 9.x, 10.x, 11.x, and 12.x and IOS XR 2.0.x, 3.0.x, and 3.2.x allows remote attackers to cause a denial of service or execute arbitrary code via a crafted IP option in the IP header in a (1) ICMP, (2) PIMv2, (3) PGM, or (4) URD packet. Cisco IOS 9.x, 10.x, 11.x y 12.x y IOS XR 2.0.x, 3.0.x y 3.2.x permite a atacantes remotos provocar una denegación de servicio o ejecutar código de su elección mediante la manipulación de la opción IP en la cabecera IP de los paquetes 1) ICMP, (2) PIMv2, (3) PGM o (4... • http://osvdb.org/32092 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-0479
https://notcve.org/view.php?id=CVE-2007-0479
25 Jan 2007 — Memory leak in the TCP listener in Cisco IOS 9.x, 10.x, 11.x, and 12.x allows remote attackers to cause a denial of service by sending crafted TCP traffic to an IPv4 address on the IOS device. Agujero de memoria en el oyente TCP de Cisco IOS 9.x, 10.x, 11.x y 12.x permite a atacantes remotos provocar una denegación de servicio mediante el envío de tráfico TCP manipulado a la dirección IPv4 en el dispositivo IOS. • http://osvdb.org/32093 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-0481
https://notcve.org/view.php?id=CVE-2007-0481
25 Jan 2007 — Cisco IOS allows remote attackers to cause a denial of service (crash) via a crafted IPv6 Type 0 Routing header. Cisco IOS permite a atacantes remotos provocar una denegación de servicio (caída) mediante una cabecera manipulada de IPv6 Type 0 Routing. • http://osvdb.org/32091 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-0199
https://notcve.org/view.php?id=CVE-2007-0199
11 Jan 2007 — The Data-link Switching (DLSw) feature in Cisco IOS 11.0 through 12.4 allows remote attackers to cause a denial of service (device reload) via "an invalid value in a DLSw message... during the capabilities exchange." La propiedad Data-link Switching (DLSw) en Cisco IOS 11.0 hata 12.4 permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) mediante "un valor inválido en un mensaje DLSw... durante el intercambio de habilidades". • http://osvdb.org/32683 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-4950
https://notcve.org/view.php?id=CVE-2006-4950
23 Sep 2006 — Cisco IOS 12.2 through 12.4 before 20060920, as used by Cisco IAD2430, IAD2431, and IAD2432 Integrated Access Devices, the VG224 Analog Phone Gateway, and the MWR 1900 and 1941 Mobile Wireless Edge Routers, is incorrectly identified as supporting DOCSIS, which allows remote attackers to gain read-write access via a hard-coded cable-docsis community string and read or modify arbitrary SNMP variables. Cisco IOS 12.2 hasta 12.4 anteriores al 20/09/2006, usados por Cisco IAD2430, IAD2431, y IAD2432 Integrated A... • http://secunia.com/advisories/21974 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-3291
https://notcve.org/view.php?id=CVE-2006-3291
28 Jun 2006 — The web interface on Cisco IOS 12.3(8)JA and 12.3(8)JA1, as used on the Cisco Wireless Access Point and Wireless Bridge, reconfigures itself when it is changed to use the "Local User List Only (Individual Passwords)" setting, which removes all security and password configurations and allows remote attackers to access the system. El interfaz web de Cisco IOS 12.3(8)JA y 12.3(8)JA1, tal como es utilizado en Cisco Wireless Access Point y Wireless Bridge, se reconfigura cuando se activa la opción de configuraci... • http://secunia.com/advisories/20860 • CWE-16: Configuration •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-0486
https://notcve.org/view.php?id=CVE-2006-0486
01 Feb 2006 — Certain Cisco IOS releases in 12.2S based trains with maintenance release number 25 and later, 12.3T based trains, and 12.4 based trains reuse a Tcl Shell process across login sessions of different local users on the same terminal if the first user does not use tclquit before exiting, which may cause subsequent local users to execute unintended commands or bypass AAA command authorization checks, aka Bug ID CSCef77770. • http://secunia.com/advisories/18613 •