Show filters
26 Total Results
Displaying 21-26 of 26
Sort by:
Attacker Value
Unknown
CVE-2005-1020
Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Secure Shell (SSH) 2 in Cisco IOS 12.0 through 12.3 allows remote attackers to cause a denial of service (device reload) (1) via a username that contains a domain name when using a TACACS+ server to authenticate, (2) when a new SSH session is in the login phase and a currently logged in user issues a send command, or (3) when IOS is logging messages and an SSH session is terminated while the server is sending data.
0
Attacker Value
Unknown
CVE-2005-0196
Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Cisco IOS 12.0 through 12.3YL, with BGP enabled and running the bgp log-neighbor-changes command, allows remote attackers to cause a denial of service (device reload) via a malformed BGP packet.
0
Attacker Value
Unknown
CVE-2004-1775
Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.
0
Attacker Value
Unknown
CVE-2003-0567
Disclosure Date: August 18, 2003 (last updated February 22, 2025)
Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full.
0
Attacker Value
Unknown
CVE-2003-0100
Disclosure Date: March 03, 2003 (last updated February 22, 2025)
Buffer overflow in Cisco IOS 11.2.x to 12.0.x allows remote attackers to cause a denial of service and possibly execute commands via a large number of OSPF neighbor announcements.
0
Attacker Value
Unknown
CVE-2001-1434
Disclosure Date: February 28, 2001 (last updated February 22, 2025)
Cisco IOS 12.0(5)XU through 12.1(2) allows remote attackers to read system administration and topology information via an "snmp-server host" command, which creates a readable "community" community string if one has not been previously created.
0