Page 56 of 281 results (0.013 seconds)

CVSS: 7.1EPSS: 0%CPEs: 102EXPL: 0

Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144). • http://www.cisco.com/warp/public/707/SSH-scanning.shtml http://www.iss.net/security_center/static/9437.php http://www.kb.cert.org/vuls/id/290140 http://www.securityfocus.com/bid/5114 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

Cisco IOS 11.1CC through 12.2 with Cisco Express Forwarding (CEF) enabled includes portions of previous packets in the padding of a MAC level packet when the MAC packet's length is less than the IP level packet length. • http://www.cisco.com/warp/public/707/IOS-CEF-pub.shtml http://www.iss.net/security_center/static/8296.php http://www.kb.cert.org/vuls/id/310387 http://www.osvdb.org/806 http://www.securityfocus.com/bid/4191 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Cisco IOS Firewall Feature set, aka Context Based Access Control (CBAC) or Cisco Secure Integrated Software, for IOS 11.2P through 12.2T does not properly check the IP protocol type, which could allow remote attackers to bypass access control lists. • http://www.cisco.com/warp/public/707/IOS-cbac-dynacl-pub.shtml http://www.kb.cert.org/vuls/id/362483 http://www.osvdb.org/808 http://www.securityfocus.com/bid/3588 https://exchange.xforce.ibmcloud.com/vulnerabilities/7614 •

CVSS: 5.0EPSS: 3%CPEs: 10EXPL: 1

Cisco routers and switches running IOS 12.0 through 12.2.1 allows a remote attacker to cause a denial of service via a flood of UDP packets. • https://www.exploit-db.com/exploits/21028 http://marc.info/?l=bugtraq&m=99749327219189&w=2 http://www.securityfocus.com/archive/1/199558 http://www.securityfocus.com/bid/3096 https://exchange.xforce.ibmcloud.com/vulnerabilities/6913 •

CVSS: 9.3EPSS: 84%CPEs: 91EXPL: 7

HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL. • https://www.exploit-db.com/exploits/20975 https://www.exploit-db.com/exploits/20976 https://www.exploit-db.com/exploits/20977 https://www.exploit-db.com/exploits/20978 http://www.cert.org/advisories/CA-2001-14.html http://www.ciac.org/ciac/bulletins/l-106.shtml http://www.cisco.com/warp/public/707/IOS-httplevel-pub.html http://www.osvdb.org/578 http://www.securityfocus.com/archive/1/1601227034.20010702112207%40olympos.org http://www.securityfocus.com/archive/1/ • CWE-287: Improper Authentication •