Page 55 of 278 results (0.016 seconds)

CVSS: 10.0EPSS: 19%CPEs: 16EXPL: 0

Multiple SSH2 servers and clients do not properly handle packets or data elements with incorrect length specifiers, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite. • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html http://securitytracker.com/id?1005812 http://securitytracker.com/id?1005813 http://www.cert.org/advisories/CA-2002-36.html http://www.kb.cert.org/vuls/id/389665 http://www.securityfocus.com/bid/6405 https://exchange.xforce.ibmcloud.com/vulnerabilities/10868 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5849 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 97%CPEs: 16EXPL: 2

Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite. • https://www.exploit-db.com/exploits/16463 https://www.exploit-db.com/exploits/1788 http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html http://securitytracker.com/id?1005812 http://securitytracker.com/id?1005813 http://www.cert.org/advisories/CA-2002-36.html http://www.securityfocus.com/bid/6407 https://exchange.xforce.ibmcloud.com/vulnerabilities/10870 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5848 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 102EXPL: 0

Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144). • http://www.cisco.com/warp/public/707/SSH-scanning.shtml http://www.iss.net/security_center/static/9437.php http://www.kb.cert.org/vuls/id/290140 http://www.securityfocus.com/bid/5114 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

Cisco IOS 11.1CC through 12.2 with Cisco Express Forwarding (CEF) enabled includes portions of previous packets in the padding of a MAC level packet when the MAC packet's length is less than the IP level packet length. • http://www.cisco.com/warp/public/707/IOS-CEF-pub.shtml http://www.iss.net/security_center/static/8296.php http://www.kb.cert.org/vuls/id/310387 http://www.osvdb.org/806 http://www.securityfocus.com/bid/4191 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Cisco IOS Firewall Feature set, aka Context Based Access Control (CBAC) or Cisco Secure Integrated Software, for IOS 11.2P through 12.2T does not properly check the IP protocol type, which could allow remote attackers to bypass access control lists. • http://www.cisco.com/warp/public/707/IOS-cbac-dynacl-pub.shtml http://www.kb.cert.org/vuls/id/362483 http://www.osvdb.org/808 http://www.securityfocus.com/bid/3588 https://exchange.xforce.ibmcloud.com/vulnerabilities/7614 •