Vulnerabilities > Cisco > IOS > 3.7.8s
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-10-19 | CVE-2017-12289 | Information Exposure vulnerability in Cisco IOS A vulnerability in conditional, verbose debug logging for the IPsec feature of Cisco IOS XE Software could allow an authenticated, local attacker to display sensitive IPsec information in the system log file. | 4.4 |
2017-09-25 | CVE-2010-3050 | Improper Input Validation vulnerability in Cisco IOS Cisco IOS before 12.2(33)SXI allows remote authenticated users to cause a denial of service (device reboot). | 6.5 |
2017-09-25 | CVE-2010-3049 | Improper Input Validation vulnerability in Cisco IOS Cisco IOS before 12.2(33)SXI allows local users to cause a denial of service (device reboot). | 5.5 |
2017-08-02 | CVE-2012-5030 | Resource Management Errors vulnerability in Cisco IOS Cisco IOS before 15.2(4)S6 does not initialize an unspecified variable, which might allow remote authenticated users to cause a denial of service (CPU consumption, watchdog timeout, crash) by walking specific SNMP objects. | 6.5 |
2016-09-22 | CVE-2014-2146 | Improper Input Validation vulnerability in Cisco IOS XE The Zone-Based Firewall (ZBFW) functionality in Cisco IOS, possibly 15.4 and earlier, and IOS XE, possibly 3.13 and earlier, mishandles zone checking for existing sessions, which allows remote attackers to bypass intended resource-access restrictions via spoofed traffic that matches one of these sessions, aka Bug IDs CSCun94946 and CSCun96847. | 6.5 |
2016-09-18 | CVE-2016-6403 | Resource Management Errors vulnerability in Cisco IOS The Data in Motion (DMo) application in Cisco IOS 15.6(1)T and IOS XE, when the IOx feature set is enabled, allows remote attackers to cause a denial of service via a crafted packet, aka Bug IDs CSCuy82904, CSCuy82909, and CSCuy82912. | 5.9 |
2004-12-31 | CVE-2004-1464 | Unspecified vulnerability in Cisco IOS Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port. | 5.9 |