Show filters
42 Total Results
Displaying 31-40 of 42
Sort by:
Attacker Value
Unknown

CVE-2007-0479

Disclosure Date: January 25, 2007 (last updated October 04, 2023)
Memory leak in the TCP listener in Cisco IOS 9.x, 10.x, 11.x, and 12.x allows remote attackers to cause a denial of service by sending crafted TCP traffic to an IPv4 address on the IOS device.
0
Attacker Value
Unknown

CVE-2007-0481

Disclosure Date: January 25, 2007 (last updated October 04, 2023)
Cisco IOS allows remote attackers to cause a denial of service (crash) via a crafted IPv6 Type 0 Routing header.
0
Attacker Value
Unknown

CVE-2006-0485

Disclosure Date: February 01, 2006 (last updated February 22, 2025)
The TCL shell in Cisco IOS 12.2(14)S before 12.2(14)S16, 12.2(18)S before 12.2(18)S11, and certain other releases before 25 January 2006 does not perform Authentication, Authorization, and Accounting (AAA) command authorization checks, which may allow local users to execute IOS EXEC commands that were prohibited via the AAA configuration, aka Bug ID CSCeh73049.
0
Attacker Value
Unknown

CVE-2005-2451

Disclosure Date: August 03, 2005 (last updated February 22, 2025)
Cisco IOS 12.0 through 12.4 and IOS XR before 3.2, with IPv6 enabled, allows remote attackers on a local network segment to cause a denial of service (device reload) and possibly execute arbitrary code via a crafted IPv6 packet.
0
Attacker Value
Unknown

CVE-2005-2105

Disclosure Date: July 05, 2005 (last updated February 22, 2025)
Cisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username.
0
Attacker Value
Unknown

CVE-2005-1020

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Secure Shell (SSH) 2 in Cisco IOS 12.0 through 12.3 allows remote attackers to cause a denial of service (device reload) (1) via a username that contains a domain name when using a TACACS+ server to authenticate, (2) when a new SSH session is in the login phase and a currently logged in user issues a send command, or (3) when IOS is logging messages and an SSH session is terminated while the server is sending data.
0
Attacker Value
Unknown

CVE-2005-0196

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Cisco IOS 12.0 through 12.3YL, with BGP enabled and running the bgp log-neighbor-changes command, allows remote attackers to cause a denial of service (device reload) via a malformed BGP packet.
0
Attacker Value
Unknown

CVE-2003-1109

Disclosure Date: December 31, 2003 (last updated February 22, 2025)
The Session Initiation Protocol (SIP) implementation in multiple Cisco products including IP Phone models 7940 and 7960, IOS versions in the 12.2 train, and Secure PIX 5.2.9 to 6.2.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.
0
Attacker Value
Unknown

CVE-2003-0567

Disclosure Date: August 18, 2003 (last updated February 22, 2025)
Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full.
0
Attacker Value
Unknown

CVE-2002-1024

Disclosure Date: October 04, 2002 (last updated February 22, 2025)
Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144).
0