Vulnerabilities > Cisco > IOS > 12.2yd
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2005-07-05 | CVE-2005-2105 | Security Bypass vulnerability in IOS Cisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username. | 7.5 |
2005-05-02 | CVE-2005-1020 | Improper Authentication vulnerability in Cisco IOS Secure Shell (SSH) 2 in Cisco IOS 12.0 through 12.3 allows remote attackers to cause a denial of service (device reload) (1) via a username that contains a domain name when using a TACACS+ server to authenticate, (2) when a new SSH session is in the login phase and a currently logged in user issues a send command, or (3) when IOS is logging messages and an SSH session is terminated while the server is sending data. | 7.1 |
2004-12-31 | CVE-2004-1464 | Remote Denial of Service vulnerability in Cisco IOS Telnet Service Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port. | 5.0 |
2003-08-18 | CVE-2003-0567 | Improper Input Validation vulnerability in Cisco products Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full. | 7.8 |
2002-10-04 | CVE-2002-1024 | Resource Management Errors vulnerability in Cisco products Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144). | 7.1 |