Vulnerabilities > Cisco

DATE CVE VULNERABILITY TITLE RISK
2006-09-21 CVE-2006-4910 Denial Of Service vulnerability in Cisco IPS/IDS Web Administration Interface
The web administration interface (mainApp) to Cisco IDS before 4.1(5c), and IPS 5.0 before 5.0(6p1) and 5.1 before 5.1(2) allows remote attackers to cause a denial of service (unresponsive device) via a crafted SSLv2 Client Hello packet.
network
low complexity
cisco
5.0
2006-09-21 CVE-2006-4909 Cross-Site Scripting vulnerability in Cisco Guard Ddos Mitigation Appliance 5.1(5)
Cross-site scripting (XSS) vulnerability in Cisco Guard DDoS Mitigation Appliance before 5.1(6), when anti-spoofing is enabled, allows remote attackers to inject arbitrary web script or HTML via certain character sequences in a URL that are not properly handled when the appliance sends a meta-refresh.
network
high complexity
cisco
2.6
2006-09-14 CVE-2006-4776 Buffer Errors vulnerability in Cisco IOS 12.1(19)
Heap-based buffer overflow in the VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) allows remote attackers to execute arbitrary code via a long VLAN name in a VTP type 2 summary advertisement.
network
low complexity
cisco CWE-119
7.5
2006-09-14 CVE-2006-4775 Resource Management Errors vulnerability in Cisco Catos and IOS
The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context.
network
low complexity
cisco CWE-399
7.8
2006-09-14 CVE-2006-4774 Resource Management Errors vulnerability in Cisco IOS 12.1(19)
The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) allows remote attackers to cause a denial of service by sending a VTP version 1 summary frame with a VTP version field value of 2.
network
low complexity
cisco CWE-399
7.8
2006-09-09 CVE-2006-4650 Remote Security vulnerability in IOS 12.0/12.1/12.2
Cisco IOS 12.0, 12.1, and 12.2, when GRE IP tunneling is used and the RFC2784 compliance fixes are missing, does not verify the offset field of a GRE packet during decapsulation, which leads to an integer overflow that references data from incorrect memory locations, which allows remote attackers to inject crafted packets into the routing queue, possibly bypassing intended router ACLs.
network
high complexity
cisco
2.6
2006-08-29 CVE-2006-4430 Unspecified vulnerability in Cisco products
The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack.
network
low complexity
cisco
5.0
2006-08-25 CVE-2006-4352 Information Disclosure vulnerability in Cisco Content Services Switch 11000 Series
The ArrowPoint cookie functionality for Cisco 11000 series Content Service Switches specifies an internal IP address if the administrator does not specify a string option, which allows remote attackers to obtain sensitive information.
network
low complexity
cisco
5.0
2006-08-23 CVE-2006-4313 Unspecified vulnerability in Cisco VPN 3000 Concentrator Series Software
Multiple unspecified vulnerabilities in Cisco VPN 3000 series concentrators before 4.1, 4.1.x up to 4.1(7)L, and 4.7.x up to 4.7(2)F allow attackers to execute the (1) CWD, (2) MKD, (3) CDUP, (4) RNFR, (5) SIZE, and (6) RMD FTP commands to modify files or create and delete directories via unknown vectors.
network
low complexity
cisco
5.0
2006-08-23 CVE-2006-4312 Firewall Appliances Authentication Bypass vulnerability in Cisco
Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a "non-random value" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access.
local
low complexity
cisco
6.8