Page 64 of 328 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Cisco 12000 with IOS 12.0 and line cards based on Engine 2 does not support the "fragment" keyword in an outgoing ACL, which could allow fragmented packets in violation of the intended access. • http://www.ciac.org/ciac/bulletins/m-018.shtml http://www.cisco.com/warp/public/707/GSR-ACL-pub.shtml http://www.osvdb.org/1988 http://www.securityfocus.com/bid/3540 https://exchange.xforce.ibmcloud.com/vulnerabilities/7552 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Cisco 12000 with IOS 12.0 and line cards based on Engine 2 does not block non-initial packet fragments, which allows remote attackers to bypass the ACL. • http://www.ciac.org/ciac/bulletins/m-018.shtml http://www.cisco.com/warp/public/707/GSR-ACL-pub.shtml http://www.osvdb.org/1985 http://www.securityfocus.com/bid/3535 https://exchange.xforce.ibmcloud.com/vulnerabilities/7550 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Cisco 12000 with IOS 12.0 and line cards based on Engine 2 does not handle the "fragment" keyword in a compiled ACL (Turbo ACL) for packets that are sent to the router, which allows remote attackers to cause a denial of service via a flood of fragments. • http://www.ciac.org/ciac/bulletins/m-018.shtml http://www.cisco.com/warp/public/707/GSR-ACL-pub.shtml http://www.osvdb.org/1987 http://www.securityfocus.com/bid/3539 https://exchange.xforce.ibmcloud.com/vulnerabilities/7551 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

Cisco SN 5420 Storage Router 1.1(3) and earlier allows remote attackers to cause a denial of service (reboot) via a series of connections to TCP port 8023. • http://www.ciac.org/ciac/bulletins/l-112.shtml http://www.cisco.com/warp/public/707/SN-kernel-pub.html http://www.osvdb.org/1899 http://www.securityfocus.com/bid/3014 https://exchange.xforce.ibmcloud.com/vulnerabilities/6826 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 1

Cisco SN 5420 Storage Router 1.1(3) and earlier allows local users to access a developer's shell without a password and execute certain restricted commands without being logged. • http://www.cisco.com/warp/public/707/SN-kernel-pub.html http://www.osvdb.org/1917 http://www.securityfocus.com/bid/3131 https://exchange.xforce.ibmcloud.com/vulnerabilities/6827 •