Page 58 of 287 results (0.004 seconds)

CVSS: 2.1EPSS: 12%CPEs: 148EXPL: 0

Cisco IOS 12.0 through 12.4 and IOS XR before 3.2, with IPv6 enabled, allows remote attackers on a local network segment to cause a denial of service (device reload) and possibly execute arbitrary code via a crafted IPv6 packet. Cisco IOS 12.0 hasta 12.4 y IOS XR anterior a 3.2 con IPv6 habilitado, permite que atacantes remotos en un segmento de red local provoquen una denegación de servicio (recarga del dispositivo) y posiblmemente ejecuten código arbitrario mediante un paquete IPv6 amañado. • http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0663.html http://secunia.com/advisories/16272 http://securitytracker.com/id?1014598 http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml http://www.kb.cert.org/vuls/id/930892 http://www.osvdb.org/18332 http://www.securityfocus.com/bid/14414 http://www.us-cert.gov/cas/techalerts/TA05-210A.html https://exchange.xforce.ibmcloud.com/vulnerabilities/21591 https://oval.cisecurity.org/repository/search/defin •

CVSS: 7.5EPSS: 0%CPEs: 92EXPL: 0

Cisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username. • http://www.cisco.com/warp/public/707/cisco-sa-20050629-aaa.shtml http://www.securitytracker.com/alerts/2005/Jun/1014330.html https://exchange.xforce.ibmcloud.com/vulnerabilities/21190 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5756 •