Page 26 of 289 results (0.017 seconds)

CVSS: 9.8EPSS: 0%CPEs: 92EXPL: 0

01 Jul 2005 — Cisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username. • http://www.cisco.com/warp/public/707/cisco-sa-20050629-aaa.shtml •

CVSS: 7.5EPSS: 1%CPEs: 93EXPL: 0

09 Apr 2005 — Memory leak in Secure Shell (SSH) in Cisco IOS 12.0 through 12.3, when authenticating against a TACACS+ server, allows remote attackers to cause a denial of service (memory consumption) via an incorrect username or password. • http://secunia.com/advisories/14854 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 3%CPEs: 337EXPL: 0

09 Apr 2005 — Secure Shell (SSH) 2 in Cisco IOS 12.0 through 12.3 allows remote attackers to cause a denial of service (device reload) (1) via a username that contains a domain name when using a TACACS+ server to authenticate, (2) when a new SSH session is in the login phase and a currently logged in user issues a send command, or (3) when IOS is logging messages and an SSH session is terminated while the server is sending data. • http://secunia.com/advisories/14854 • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

06 Feb 2005 — Cisco IOS 12.1T, 12.2, 12.2T, 12.3 and 12.3T, with Multi Protocol Label Switching (MPLS) installed but disabled, allows remote attackers to cause a denial of service (device reload) via a crafted packet sent to the disabled interface. • http://secunia.com/advisories/14031 • CWE-16: Configuration •

CVSS: 7.5EPSS: 2%CPEs: 196EXPL: 0

06 Feb 2005 — Cisco IOS 12.0 through 12.3YL, with BGP enabled and running the bgp log-neighbor-changes command, allows remote attackers to cause a denial of service (device reload) via a malformed BGP packet. • http://secunia.com/advisories/14034 •

CVSS: 7.5EPSS: 2%CPEs: 76EXPL: 0

06 Feb 2005 — Cisco IOS 12.0S through 12.3YH allows remote attackers to cause a denial of service (device restart) via a crafted IPv6 packet. • http://www.cisco.com/warp/public/707/cisco-sa-20050126-ipv6.shtml •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 1

19 Jan 2005 — Cisco IOS 12.1YD, 12.2T, 12.3 and 12.3T, when configured for the IOS Telephony Service (ITS), CallManager Express (CME) or Survivable Remote Site Telephony (SRST), allows remote attackers to cause a denial of service (device reboot) via a malformed packet to the SCCP port. • http://secunia.com/advisories/13913 •

CVSS: 7.5EPSS: 1%CPEs: 77EXPL: 0

31 Dec 2004 — Cisco IOS 12.0S, 12.2, and 12.3, with Open Shortest Path First (OSPF) enabled, allows remote attackers to cause a denial of service (device reload) via a malformed OSPF packet. • http://secunia.com/advisories/12322 •

CVSS: 5.9EPSS: 6%CPEs: 1EXPL: 0

31 Dec 2004 — Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port. Cisco IOS contains an unspecified vulnerability that may block further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases, Hypertext Transport Protocol (HTTP) access to the Cisco device. • http://secunia.com/advisories/12395 •

CVSS: 7.5EPSS: 3%CPEs: 17EXPL: 0

01 Dec 2004 — Cisco IOS 2.2(18)EW, 12.2(18)EWA, 12.2(14)SZ, 12.2(18)S, 12.2(18)SE, 12.2(18)SV, 12.2(18)SW, and other versions without the "no service dhcp" command, keep undeliverable DHCP packets in the queue instead of dropping them, which allows remote attackers to cause a denial of service (dropped traffic) via multiple undeliverable DHCP packets that exceed the input queue size. • http://www.ciac.org/ciac/bulletins/p-034.shtml •