CVE-2005-0195
https://notcve.org/view.php?id=CVE-2005-0195
Cisco IOS 12.0S through 12.3YH allows remote attackers to cause a denial of service (device restart) via a crafted IPv6 packet. • http://www.cisco.com/warp/public/707/cisco-sa-20050126-ipv6.shtml http://www.kb.cert.org/vuls/id/472582 http://www.us-cert.gov/cas/techalerts/TA05-026A.html https://exchange.xforce.ibmcloud.com/vulnerabilities/19072 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5813 •
CVE-2005-0186
https://notcve.org/view.php?id=CVE-2005-0186
Cisco IOS 12.1YD, 12.2T, 12.3 and 12.3T, when configured for the IOS Telephony Service (ITS), CallManager Express (CME) or Survivable Remote Site Telephony (SRST), allows remote attackers to cause a denial of service (device reboot) via a malformed packet to the SCCP port. • http://secunia.com/advisories/13913 http://securitytracker.com/id?1012945 http://www.cisco.com/warp/public/707/cisco-sa-20050119-itscme.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/18956 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4849 •
CVE-2004-1464 – Cisco IOS Denial-of-Service Vulnerability
https://notcve.org/view.php?id=CVE-2004-1464
Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port. Cisco IOS contains an unspecified vulnerability that may block further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases, Hypertext Transport Protocol (HTTP) access to the Cisco device. • http://secunia.com/advisories/12395 http://securitytracker.com/id?1011079 http://www.cisco.com/warp/public/707/cisco-sa-20040827-telnet.shtml http://www.kb.cert.org/vuls/id/384230 http://www.securityfocus.com/bid/11060 https://exchange.xforce.ibmcloud.com/vulnerabilities/17131 •
CVE-2004-1454
https://notcve.org/view.php?id=CVE-2004-1454
Cisco IOS 12.0S, 12.2, and 12.3, with Open Shortest Path First (OSPF) enabled, allows remote attackers to cause a denial of service (device reload) via a malformed OSPF packet. • http://secunia.com/advisories/12322 http://www.ciac.org/ciac/bulletins/o-199.shtml http://www.cisco.com/warp/public/707/cisco-sa-20040818-ospf.shtml http://www.kb.cert.org/vuls/id/989406 http://www.securityfocus.com/bid/10971 https://exchange.xforce.ibmcloud.com/vulnerabilities/17033 •
CVE-2004-0714
https://notcve.org/view.php?id=CVE-2004-0714
Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption). Cisco Internetwork Operating System (IOS) 12.0S a 12.3T intenta procesar operaciones SNMP solicitadas en puertos inapropiados (UDP 162 y un puerto UDP escogido aleatoriamente), lo que permite a atacantes remotos causar una denegación de servicio (recarga del dispositivo y corrupción de memoria) • http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml http://www.kb.cert.org/vuls/id/162451 http://www.securityfocus.com/bid/10186 http://www.us-cert.gov/cas/techalerts/TA04-111B.html https://exchange.xforce.ibmcloud.com/vulnerabilities/15921 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5845 •