Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2011-2059 |
The ipv6 component in Cisco IOS before 15.1(4)M1.3 allows remote attackers to conduct fingerprinting attacks and obtain potentially sensitive information about the presence of the IOS operating system via an ICMPv6 Echo Request packet containing a Hop-by-Hop (HBH) extension header (EH) with a 0x0c01050c value in the PadN option data, aka Bug ID CSCtq02219. Published: October 21, 2011; 10:59:19 PM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2011-3279 |
The provider-edge MPLS NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload) via a malformed SIP packet to UDP port 5060, aka Bug ID CSCti98219. Published: October 03, 2011; 7:55:03 PM -0400 |
V3.x:(not available) V2.0: 7.8 HIGH |
CVE-2011-0946 |
The NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload or hang) via malformed NetMeeting Directory (aka Internet Locator Service or ILS) LDAP traffic, aka Bug ID CSCtd10712. Published: October 03, 2011; 7:55:03 PM -0400 |
V3.x:(not available) V2.0: 7.8 HIGH |
CVE-2010-4687 |
STCAPP (aka the SCCP telephony control application) on Cisco IOS before 15.0(1)XA1 does not properly handle multiple calls to a shared line, which allows remote attackers to cause a denial of service (port hang) by simultaneously ending two calls that were controlled by CallManager Express (CME), aka Bug ID CSCtd42552. Published: January 07, 2011; 2:00:20 PM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2010-4686 |
CallManager Express (CME) on Cisco IOS before 15.0(1)XA1 does not properly handle SIP TRUNK traffic that contains rate bursts and a "peculiar" request size, which allows remote attackers to cause a denial of service (memory consumption) by sending this traffic over a long duration, aka Bug ID CSCtb47950. Published: January 07, 2011; 2:00:20 PM -0500 |
V3.x:(not available) V2.0: 7.8 HIGH |
CVE-2010-4685 |
Cisco IOS before 15.0(1)XA1 does not clear the public key cache upon a change to a certificate map, which allows remote authenticated users to bypass a certificate ban by connecting with a banned certificate that had previously been valid, aka Bug ID CSCta79031. Published: January 07, 2011; 2:00:20 PM -0500 |
V3.x:(not available) V2.0: 4.0 MEDIUM |
CVE-2010-4684 |
Cisco IOS before 15.0(1)XA1, when certain TFTP debugging is enabled, allows remote attackers to cause a denial of service (device crash) via a TFTP copy over IPv6, aka Bug ID CSCtb28877. Published: January 07, 2011; 2:00:20 PM -0500 |
V3.x:(not available) V2.0: 7.1 HIGH |
CVE-2010-4683 |
Memory leak in Cisco IOS before 15.0(1)XA5 might allow remote attackers to cause a denial of service (memory consumption) by sending a crafted SIP REGISTER message over UDP, aka Bug ID CSCtg41733. Published: January 07, 2011; 2:00:20 PM -0500 |
V3.x:(not available) V2.0: 7.8 HIGH |
CVE-2009-5040 |
CallManager Express (CME) on Cisco IOS before 15.0(1)XA allows remote authenticated users to cause a denial of service (device crash) by using an extension mobility (EM) phone to interact with the menu for SNR number changes, aka Bug ID CSCta63555. Published: January 07, 2011; 2:00:16 PM -0500 |
V3.x:(not available) V2.0: 6.8 MEDIUM |
CVE-2009-5039 |
Memory leak in the gk_circuit_info_do_in_acf function in the H.323 implementation in Cisco IOS before 15.0(1)XA allows remote attackers to cause a denial of service (memory consumption) via a large number of calls over a long duration, as demonstrated by InterZone Clear Token (IZCT) test traffic, aka Bug ID CSCsz72535. Published: January 07, 2011; 2:00:16 PM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2009-5038 |
Cisco IOS before 15.0(1)XA does not properly handle IRC traffic during a specific time period after an initial reload, which allows remote attackers to cause a denial of service (device reload) via an attempted connection to a certain IRC server, related to a "corrupted magic value," aka Bug ID CSCso05336. Published: January 07, 2011; 2:00:02 PM -0500 |
V3.x:(not available) V2.0: 7.8 HIGH |
CVE-2010-4671 |
The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Cisco IOS before 15.0(1)XA5 allows remote attackers to cause a denial of service (CPU consumption and device hang) by sending many Router Advertisement (RA) messages with different source addresses, as demonstrated by the flood_router6 program in the thc-ipv6 package, aka Bug ID CSCti33534. Published: January 07, 2011; 7:00:49 AM -0500 |
V3.x:(not available) V2.0: 7.8 HIGH |
CVE-2010-0576 |
Unspecified vulnerability in Cisco IOS 12.0 through 12.4, IOS XE 2.1.x through 2.3.x before 2.3.2, and IOS XR 3.2.x through 3.4.3, when Multiprotocol Label Switching (MPLS) and Label Distribution Protocol (LDP) are enabled, allows remote attackers to cause a denial of service (device reload or process restart) via a crafted LDP packet, aka Bug IDs CSCsz45567 and CSCsj25893. Published: March 25, 2010; 5:00:00 PM -0400 |
V3.x:(not available) V2.0: 7.8 HIGH |
CVE-2009-2873 |
Cisco IOS 12.0 through 12.4, when IP-based tunnels and the Cisco Express Forwarding feature are enabled, allows remote attackers to cause a denial of service (device reload) via malformed packets, aka Bug ID CSCsx70889. Published: September 28, 2009; 3:30:01 PM -0400 |
V3.x:(not available) V2.0: 7.1 HIGH |
CVE-2009-2872 |
Cisco IOS 12.0 through 12.4, when IP-based tunnels and the Cisco Express Forwarding feature are enabled, allows remote attackers to cause a denial of service (device reload) via a malformed packet that is not properly handled during switching from one tunnel to a second tunnel, aka Bug IDs CSCsh97579 and CSCsq31776. Published: September 28, 2009; 3:30:01 PM -0400 |
V3.x:(not available) V2.0: 6.8 MEDIUM |
CVE-2009-0636 |
Unspecified vulnerability in Cisco IOS 12.0 through 12.4, when SIP voice services are enabled, allows remote attackers to cause a denial of service (device crash) via a valid SIP message. Published: March 27, 2009; 12:30:02 PM -0400 |
V3.x:(not available) V2.0: 7.8 HIGH |
CVE-2009-0630 |
The (1) Cisco Unified Communications Manager Express; (2) SIP Gateway Signaling Support Over Transport Layer Security (TLS) Transport; (3) Secure Signaling and Media Encryption; (4) Blocks Extensible Exchange Protocol (BEEP); (5) Network Admission Control HTTP Authentication Proxy; (6) Per-user URL Redirect for EAPoUDP, Dot1x, and MAC Authentication Bypass; (7) Distributed Director with HTTP Redirects; and (8) TCP DNS features in Cisco IOS 12.0 through 12.4 do not properly handle IP sockets, which allows remote attackers to cause a denial of service (outage or resource consumption) via a series of crafted TCP packets. Published: March 27, 2009; 12:30:02 PM -0400 |
V3.x:(not available) V2.0: 7.1 HIGH |
CVE-2009-0631 |
Unspecified vulnerability in Cisco IOS 12.0 through 12.4, when configured with (1) IP Service Level Agreements (SLAs) Responder, (2) Session Initiation Protocol (SIP), (3) H.323 Annex E Call Signaling Transport, or (4) Media Gateway Control Protocol (MGCP) allows remote attackers to cause a denial of service (blocked input queue on the inbound interface) via a crafted UDP packet. Published: March 27, 2009; 11:16:24 AM -0400 |
V3.x:(not available) V2.0: 7.8 HIGH |
CVE-2008-3821 |
Multiple cross-site scripting (XSS) vulnerabilities in the HTTP server in Cisco IOS 11.0 through 12.4 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to the ping program or (2) unspecified other aspects of the URI. Published: January 16, 2009; 4:30:03 PM -0500 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2008-5230 |
The Temporal Key Integrity Protocol (TKIP) implementation in unspecified Cisco products and other vendors' products, as used in WPA and WPA2 on Wi-Fi networks, has insufficient countermeasures against certain crafted and replayed packets, which makes it easier for remote attackers to decrypt packets from an access point (AP) to a client and spoof packets from an AP to a client, and conduct ARP poisoning attacks or other attacks, as demonstrated by tkiptun-ng. Published: November 25, 2008; 6:30:00 PM -0500 |
V3.x:(not available) V2.0: 6.8 MEDIUM |