Page 36 of 179 results (0.004 seconds)

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

Cisco IOS 12.1(3) and 12.1(3)T allows remote attackers to read and modify device configuration data via the cable-docsis read-write community string used by the Data Over Cable Service Interface Specification (DOCSIS) standard. • http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml http://www.kb.cert.org/vuls/id/840665 https://exchange.xforce.ibmcloud.com/vulnerabilities/6180 •

CVSS: 5.0EPSS: 0%CPEs: 201EXPL: 0

Cisco IOS 12.0(5)XU through 12.1(2) allows remote attackers to read system administration and topology information via an "snmp-server host" command, which creates a readable "community" community string if one has not been previously created. • http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml http://www.kb.cert.org/vuls/id/848944 https://exchange.xforce.ibmcloud.com/vulnerabilities/6178 •

CVSS: 5.0EPSS: 0%CPEs: 24EXPL: 2

The HTTP server in Cisco IOS 12.0 through 12.1 allows local users to cause a denial of service (crash and reload) via a URL containing a "?/" string. • https://www.exploit-db.com/exploits/20323 http://www.cisco.com/warp/public/707/ioshttpserverquery-pub.shtml http://www.securityfocus.com/bid/1838 https://exchange.xforce.ibmcloud.com/vulnerabilities/5412 •

CVSS: 5.0EPSS: 0%CPEs: 18EXPL: 0

Cisco Gigabit Switch Routers (GSR) with Fast Ethernet / Gigabit Ethernet cards, from IOS versions 11.2(15)GS1A up to 11.2(19)GS0.2 and some versions of 12.0, do not properly handle line card failures, which allows remote attackers to bypass ACLs or force the interface to stop forwarding packets. • http://www.cisco.com/warp/public/707/gsraclbypassdos-pub.shtml http://www.osvdb.org/793 http://www.osvdb.org/798 http://www.securityfocus.com/bid/1541 •