Page 27 of 148 results (0.004 seconds)

CVSS: 7.8EPSS: 1%CPEs: 4EXPL: 2

Cisco IOS 11.2.x and 12.0.x does not limit the size of its redirect table, which allows remote attackers to cause a denial of service (memory consumption) via spoofed ICMP redirect packets to the router. • https://www.exploit-db.com/exploits/21465 http://online.securityfocus.com/archive/1/273421 http://online.securityfocus.com/archive/1/273488 http://www.iss.net/security_center/static/9129.php http://www.securityfocus.com/bid/4786 •

CVSS: 7.1EPSS: 0%CPEs: 102EXPL: 0

Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144). • http://www.cisco.com/warp/public/707/SSH-scanning.shtml http://www.iss.net/security_center/static/9437.php http://www.kb.cert.org/vuls/id/290140 http://www.securityfocus.com/bid/5114 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

Cisco IOS 11.1CC through 12.2 with Cisco Express Forwarding (CEF) enabled includes portions of previous packets in the padding of a MAC level packet when the MAC packet's length is less than the IP level packet length. • http://www.cisco.com/warp/public/707/IOS-CEF-pub.shtml http://www.iss.net/security_center/static/8296.php http://www.kb.cert.org/vuls/id/310387 http://www.osvdb.org/806 http://www.securityfocus.com/bid/4191 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Cisco IOS Firewall Feature set, aka Context Based Access Control (CBAC) or Cisco Secure Integrated Software, for IOS 11.2P through 12.2T does not properly check the IP protocol type, which could allow remote attackers to bypass access control lists. • http://www.cisco.com/warp/public/707/IOS-cbac-dynacl-pub.shtml http://www.kb.cert.org/vuls/id/362483 http://www.osvdb.org/808 http://www.securityfocus.com/bid/3588 https://exchange.xforce.ibmcloud.com/vulnerabilities/7614 •

CVSS: 5.0EPSS: 2%CPEs: 7EXPL: 0

Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements. • http://www.kb.cert.org/vuls/id/139491 http://www.osvdb.org/1969 http://www.securityfocus.com/archive/1/219257 http://www.securityfocus.com/archive/1/219305 http://www.securityfocus.com/bid/3412 https://exchange.xforce.ibmcloud.com/vulnerabilities/7242 •