Page 91 of 517 results (0.027 seconds)

CVSS: 5.9EPSS: 1%CPEs: 1EXPL: 0

Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port. Cisco IOS contains an unspecified vulnerability that may block further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases, Hypertext Transport Protocol (HTTP) access to the Cisco device. • http://secunia.com/advisories/12395 http://securitytracker.com/id?1011079 http://www.cisco.com/warp/public/707/cisco-sa-20040827-telnet.shtml http://www.kb.cert.org/vuls/id/384230 http://www.securityfocus.com/bid/11060 https://exchange.xforce.ibmcloud.com/vulnerabilities/17131 •

CVSS: 5.0EPSS: 2%CPEs: 77EXPL: 0

Cisco IOS 12.0S, 12.2, and 12.3, with Open Shortest Path First (OSPF) enabled, allows remote attackers to cause a denial of service (device reload) via a malformed OSPF packet. • http://secunia.com/advisories/12322 http://www.ciac.org/ciac/bulletins/o-199.shtml http://www.cisco.com/warp/public/707/cisco-sa-20040818-ospf.shtml http://www.kb.cert.org/vuls/id/989406 http://www.securityfocus.com/bid/10971 https://exchange.xforce.ibmcloud.com/vulnerabilities/17033 •

CVSS: 5.0EPSS: 0%CPEs: 69EXPL: 0

Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string. • http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml http://www.kb.cert.org/vuls/id/645400 http://www.securityfocus.com/bid/5030 https://exchange.xforce.ibmcloud.com/vulnerabilities/6179 •

CVSS: 5.0EPSS: 1%CPEs: 17EXPL: 0

Cisco IOS 2.2(18)EW, 12.2(18)EWA, 12.2(14)SZ, 12.2(18)S, 12.2(18)SE, 12.2(18)SV, 12.2(18)SW, and other versions without the "no service dhcp" command, keep undeliverable DHCP packets in the queue instead of dropping them, which allows remote attackers to cause a denial of service (dropped traffic) via multiple undeliverable DHCP packets that exceed the input queue size. • http://www.ciac.org/ciac/bulletins/p-034.shtml http://www.cisco.com/warp/public/707/cisco-sa-20041110-dhcp.shtml http://www.kb.cert.org/vuls/id/630104 http://www.us-cert.gov/cas/techalerts/TA04-316A.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5632 •

CVSS: 5.0EPSS: 2%CPEs: 8EXPL: 0

IP Security VPN Services Module (VPNSM) in Cisco Catalyst 6500 Series Switch and the Cisco 7600 Series Internet Routers running IOS before 12.2(17b)SXA, before 12.2(17d)SXB, or before 12.2(14)SY03 could allow remote attackers to cause a denial of service (device crash and reload) via a malformed Internet Key Exchange (IKE) packet. El Módulo de Servicios de Seguridad VPN (VPNSM) del Cisco Catalyst 6500 Series Switch y el Cisco 7600 Series Internet Routers corriendo IOS anterioreas a 12.2(17b)SXA, anteriores a 12.2(17d)SXB, o anteriores a before 12.2(14)SY03) podría permitir a atacantes remotos causar una denegación de servicio (caída y reinicio del dispositivo) mediante un paquete Internet Key Exchange (IKE) malformado. • http://www.cisco.com/warp/public/707/cisco-sa-20040408-vpnsm.shtml http://www.kb.cert.org/vuls/id/904310 http://www.securityfocus.com/bid/10083 https://exchange.xforce.ibmcloud.com/vulnerabilities/15797 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5696 •