Page 34 of 407 results (0.013 seconds)

CVSS: 9.8EPSS: 15%CPEs: 148EXPL: 0

03 Aug 2005 — Cisco IOS 12.0 through 12.4 and IOS XR before 3.2, with IPv6 enabled, allows remote attackers on a local network segment to cause a denial of service (device reload) and possibly execute arbitrary code via a crafted IPv6 packet. Cisco IOS 12.0 hasta 12.4 y IOS XR anterior a 3.2 con IPv6 habilitado, permite que atacantes remotos en un segmento de red local provoquen una denegación de servicio (recarga del dispositivo) y posiblmemente ejecuten código arbitrario mediante un paquete IPv6 amañado. • http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0663.html •

CVSS: 9.8EPSS: 0%CPEs: 92EXPL: 0

01 Jul 2005 — Cisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username. • http://www.cisco.com/warp/public/707/cisco-sa-20050629-aaa.shtml •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

12 Apr 2005 — Cisco IOS 12.2T, 12.3 and 12.3T, when processing an ISAKMP profile that specifies XAUTH authentication after Phase 1 negotiation, may not process certain attributes in the ISAKMP profile that specifies XAUTH, which allows remote attackers to bypass XAUTH and move to Phase 2 negotiations. • http://www.cisco.com/warp/public/707/cisco-sa-20050406-xauth.shtml •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

12 Apr 2005 — Cisco IOS 12.2T, 12.3 and 12.3T, when using Easy VPN Server XAUTH version 6 authentication, allows remote attackers to bypass authentication via a "malformed packet." • http://www.cisco.com/warp/public/707/cisco-sa-20050406-xauth.shtml •

CVSS: 7.5EPSS: 1%CPEs: 93EXPL: 0

09 Apr 2005 — Memory leak in Secure Shell (SSH) in Cisco IOS 12.0 through 12.3, when authenticating against a TACACS+ server, allows remote attackers to cause a denial of service (memory consumption) via an incorrect username or password. • http://secunia.com/advisories/14854 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 3%CPEs: 337EXPL: 0

09 Apr 2005 — Secure Shell (SSH) 2 in Cisco IOS 12.0 through 12.3 allows remote attackers to cause a denial of service (device reload) (1) via a username that contains a domain name when using a TACACS+ server to authenticate, (2) when a new SSH session is in the login phase and a currently logged in user issues a send command, or (3) when IOS is logging messages and an SSH session is terminated while the server is sending data. • http://secunia.com/advisories/14854 • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

06 Feb 2005 — Cisco IOS 12.1T, 12.2, 12.2T, 12.3 and 12.3T, with Multi Protocol Label Switching (MPLS) installed but disabled, allows remote attackers to cause a denial of service (device reload) via a crafted packet sent to the disabled interface. • http://secunia.com/advisories/14031 • CWE-16: Configuration •

CVSS: 7.5EPSS: 2%CPEs: 196EXPL: 0

06 Feb 2005 — Cisco IOS 12.0 through 12.3YL, with BGP enabled and running the bgp log-neighbor-changes command, allows remote attackers to cause a denial of service (device reload) via a malformed BGP packet. • http://secunia.com/advisories/14034 •

CVSS: 7.5EPSS: 2%CPEs: 76EXPL: 0

06 Feb 2005 — Cisco IOS 12.0S through 12.3YH allows remote attackers to cause a denial of service (device restart) via a crafted IPv6 packet. • http://www.cisco.com/warp/public/707/cisco-sa-20050126-ipv6.shtml •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 1

19 Jan 2005 — Cisco IOS 12.1YD, 12.2T, 12.3 and 12.3T, when configured for the IOS Telephony Service (ITS), CallManager Express (CME) or Survivable Remote Site Telephony (SRST), allows remote attackers to cause a denial of service (device reboot) via a malformed packet to the SCCP port. • http://secunia.com/advisories/13913 •