Show filters
40 Total Results
Displaying 31-40 of 40
Sort by:
Attacker Value
Unknown
CVE-2007-0481
Disclosure Date: January 25, 2007 (last updated October 04, 2023)
Cisco IOS allows remote attackers to cause a denial of service (crash) via a crafted IPv6 Type 0 Routing header.
0
Attacker Value
Unknown
CVE-2006-0485
Disclosure Date: February 01, 2006 (last updated February 22, 2025)
The TCL shell in Cisco IOS 12.2(14)S before 12.2(14)S16, 12.2(18)S before 12.2(18)S11, and certain other releases before 25 January 2006 does not perform Authentication, Authorization, and Accounting (AAA) command authorization checks, which may allow local users to execute IOS EXEC commands that were prohibited via the AAA configuration, aka Bug ID CSCeh73049.
0
Attacker Value
Unknown
CVE-2006-0340
Disclosure Date: January 21, 2006 (last updated February 22, 2025)
Unspecified vulnerability in Stack Group Bidding Protocol (SGBP) support in Cisco IOS 12.0 through 12.4 running on various Cisco products, when SGBP is enabled, allows remote attackers on the local network to cause a denial of service (device hang and network traffic loss) via a crafted UDP packet to port 9900.
0
Attacker Value
Unknown
CVE-2005-2451
Disclosure Date: August 03, 2005 (last updated February 22, 2025)
Cisco IOS 12.0 through 12.4 and IOS XR before 3.2, with IPv6 enabled, allows remote attackers on a local network segment to cause a denial of service (device reload) and possibly execute arbitrary code via a crafted IPv6 packet.
0
Attacker Value
Unknown
CVE-2005-2105
Disclosure Date: July 05, 2005 (last updated February 22, 2025)
Cisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username.
0
Attacker Value
Unknown
CVE-2005-1020
Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Secure Shell (SSH) 2 in Cisco IOS 12.0 through 12.3 allows remote attackers to cause a denial of service (device reload) (1) via a username that contains a domain name when using a TACACS+ server to authenticate, (2) when a new SSH session is in the login phase and a currently logged in user issues a send command, or (3) when IOS is logging messages and an SSH session is terminated while the server is sending data.
0
Attacker Value
Unknown
CVE-2005-1021
Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Memory leak in Secure Shell (SSH) in Cisco IOS 12.0 through 12.3, when authenticating against a TACACS+ server, allows remote attackers to cause a denial of service (memory consumption) via an incorrect username or password.
0
Attacker Value
Unknown
CVE-2005-0196
Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Cisco IOS 12.0 through 12.3YL, with BGP enabled and running the bgp log-neighbor-changes command, allows remote attackers to cause a denial of service (device reload) via a malformed BGP packet.
0
Attacker Value
Unknown
CVE-2003-1109
Disclosure Date: December 31, 2003 (last updated February 22, 2025)
The Session Initiation Protocol (SIP) implementation in multiple Cisco products including IP Phone models 7940 and 7960, IOS versions in the 12.2 train, and Secure PIX 5.2.9 to 6.2.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.
0
Attacker Value
Unknown
CVE-2003-0567
Disclosure Date: August 18, 2003 (last updated February 22, 2025)
Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full.
0