cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2012-5037,https://securityvulnerability.io/vulnerability/CVE-2012-5037,,"The ACL implementation in Cisco IOS before 15.1(1)SY on Catalyst 6500 and 7600 devices allows local users to cause a denial of service (device reload) via a ""no object-group"" command followed by an object-group command, aka Bug ID CSCts16133.",Cisco,"Ios,Catalyst 6500,Catalyst 7600",,,0.0006799999973736703,false,,false,false,false,,,false,false,,2014-04-23T10:00:00.000Z,0 CVE-2014-2124,https://securityvulnerability.io/vulnerability/CVE-2014-2124,,"Cisco IOS 15.1(2)SY3 and earlier, when used with Supervisor Engine 2T (aka Sup2T) on Catalyst 6500 devices, allows remote attackers to cause a denial of service (device crash) via crafted multicast packets, aka Bug ID CSCuf60783.",Cisco,"Ios,Catalyst 6500",,,0.010660000145435333,false,,false,false,false,,,false,false,,2014-03-21T01:04:00.000Z,0 CVE-2012-4663,https://securityvulnerability.io/vulnerability/CVE-2012-4663,,"The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.13) and the Firewall Services Module (FWSM) 4.1 before 4.1(7) in Cisco Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via a crafted DCERPC packet, aka Bug IDs CSCtr21346 and CSCtr27521.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,7600 Router,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.01923000067472458,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2012-4659,https://securityvulnerability.io/vulnerability/CVE-2012-4659,,"The AAA functionality in the IPv4 SSL VPN implementations on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.2 before 8.2(5.30) and 8.3 before 8.3(2.34) allows remote attackers to cause a denial of service (device reload) via a crafted authentication response, aka Bug ID CSCtz04566.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.005630000028759241,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2012-4643,https://securityvulnerability.io/vulnerability/CVE-2012-4643,,"The DHCP server on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 7.0 before 7.2(5.8), 7.1 before 7.2(5.8), 7.2 before 7.2(5.8), 8.0 before 8.0(5.28), 8.1 before 8.1(2.56), 8.2 before 8.2(5.27), 8.3 before 8.3(2.31), 8.4 before 8.4(3.10), 8.5 before 8.5(1.9), and 8.6 before 8.6(1.5) does not properly allocate memory for DHCP packets, which allows remote attackers to cause a denial of service (device reload) via a series of crafted IPv4 packets, aka Bug ID CSCtw84068.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.005630000028759241,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2012-4660,https://securityvulnerability.io/vulnerability/CVE-2012-4660,,"The SIP inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.2 before 8.2(5.17), 8.3 before 8.3(2.28), 8.4 before 8.4(2.13), 8.5 before 8.5(1.4), and 8.6 before 8.6(1.5) allows remote attackers to cause a denial of service (device reload) via a crafted SIP media-update packet, aka Bug ID CSCtr63728.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.005200000014156103,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2012-4661,https://securityvulnerability.io/vulnerability/CVE-2012-4661,,"Stack-based buffer overflow in the DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.34), 8.4 before 8.4(4.4), 8.5 before 8.5(1.13), and 8.6 before 8.6(1.3) and the Firewall Services Module (FWSM) 4.1 before 4.1(9) in Cisco Catalyst 6500 series switches and 7600 series routers might allow remote attackers to execute arbitrary code via a crafted DCERPC packet, aka Bug IDs CSCtr21359 and CSCtr27522.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,7600 Router,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.08340000361204147,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2012-4662,https://securityvulnerability.io/vulnerability/CVE-2012-4662,,"The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.13) and the Firewall Services Module (FWSM) 4.1 before 4.1(7) in Cisco Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via a crafted DCERPC packet, aka Bug IDs CSCtr21376 and CSCtr27524.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,7600 Router,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.01923000067472458,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2012-3058,https://securityvulnerability.io/vulnerability/CVE-2012-3058,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.4 before 8.4(4.1), 8.5 before 8.5(1.11), and 8.6 before 8.6(1.3) allow remote attackers to cause a denial of service (device reload) via IPv6 transit traffic that triggers syslog message 110003, aka Bug ID CSCua27134.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2012-06-20T20:00:00.000Z,0 CVE-2012-0356,https://securityvulnerability.io/vulnerability/CVE-2012-0356,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 7.0 through 7.2 before 7.2(5.7), 8.0 before 8.0(5.27), 8.1 before 8.1(2.53), 8.2 before 8.2(5.8), 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.2) and the Firewall Services Module (FWSM) 3.1 and 3.2 before 3.2(23) and 4.0 and 4.1 before 4.1(8) in Cisco Catalyst 6500 series devices, when multicast routing is enabled, allow remote attackers to cause a denial of service (device reload) via a crafted IPv4 PIM message, aka Bug IDs CSCtr47517 and CSCtu97367.",Cisco,"Firewall Services Module Software,Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e,Firewall Services Module",,,0.026660000905394554,false,,false,false,false,,,false,false,,2012-03-15T00:00:00.000Z,0 CVE-2012-0355,https://securityvulnerability.io/vulnerability/CVE-2012-0355,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.4 before 8.4(2.11) and 8.5 before 8.5(1.4) allow remote attackers to cause a denial of service (device reload) via (1) IPv4 or (2) IPv6 packets that trigger syslog message 305006, aka Bug ID CSCts39634.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.01355000026524067,false,,false,false,false,,,false,false,,2012-03-15T00:00:00.000Z,0 CVE-2012-0353,https://securityvulnerability.io/vulnerability/CVE-2012-0353,,"The UDP inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.5), 8.3 before 8.3(2.22), 8.4 before 8.4(2.1), and 8.5 before 8.5(1.2) does not properly handle flows, which allows remote attackers to cause a denial of service (device reload) via a crafted series of (1) IPv4 or (2) IPv6 UDP packets, aka Bug ID CSCtq10441.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.022089999169111252,false,,false,false,false,,,false,false,,2012-03-15T00:00:00.000Z,0 CVE-2012-0354,https://securityvulnerability.io/vulnerability/CVE-2012-0354,,"The Threat Detection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.0 through 8.2 before 8.2(5.20), 8.3 before 8.3(2.29), 8.4 before 8.4(3), 8.5 before 8.5(1.6), and 8.6 before 8.6(1.1) allows remote attackers to cause a denial of service (device reload) via (1) IPv4 or (2) IPv6 packets that trigger a shun event, aka Bug ID CSCtw35765.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.022089999169111252,false,,false,false,false,,,false,false,,2012-03-15T00:00:00.000Z,0 CVE-2011-3304,https://securityvulnerability.io/vulnerability/CVE-2011-3304,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.2 before 7.2(5.3), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2), and 8.5 before 8.5(1.1) allow remote attackers to cause a denial of service (device reload) via crafted MSN Instant Messenger traffic, aka Bug ID CSCtl67486.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Asa 5500,Catalyst 6500,Catalyst 7600",,,0.00675999978557229,false,,false,false,false,,,false,false,,2011-10-06T10:00:00.000Z,0 CVE-2011-3296,https://securityvulnerability.io/vulnerability/CVE-2011-3296,,"Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875.",Cisco,"Firewall Services Module Software,Catalyst 6500,Catalyst 7600",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2011-10-06T10:00:00.000Z,0 CVE-2011-3297,https://securityvulnerability.io/vulnerability/CVE-2011-3297,,"Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697.",Cisco,"Firewall Services Module Software,Catalyst 6500,Catalyst 7600",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2011-10-06T10:00:00.000Z,0 CVE-2009-0059,https://securityvulnerability.io/vulnerability/CVE-2009-0059,,"The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.2.x before 5.2.157.0 allow remote attackers to cause a denial of service (device reload) via a web authentication (aka WebAuth) session that includes a malformed POST request to login.html.",Cisco,"Wireless Lan Controller Software,Catalyst 6500 Series Integrated Wireless Lan Controller,Catalyst 3750 Series Integrated Wireless Lan Controller,Catalyst 7600 Series Wireless Lan Controller,4400 Wireless Lan Controller",,,0.00675999978557229,false,,false,false,false,,,false,false,,2009-02-05T00:00:00.000Z,0 CVE-2009-0061,https://securityvulnerability.io/vulnerability/CVE-2009-0061,,"Unspecified vulnerability in the Wireless LAN Controller (WLC) TSEC driver in the Cisco 4400 WLC, Cisco Catalyst 6500 and 7600 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.1 allows remote attackers to cause a denial of service (device crash or hang) via unknown IP packets.",Cisco,"Catalyst 6500 Series Integrated Wireless Lan Controller,Wireless Lan Controller Software,4400 Wireless Lan Controller,Catalyst 3750 Series Integrated Wireless Lan Controller,Catalyst 7600 Series Wireless Lan Controller",,,0.00675999978557229,false,,false,false,false,,,false,false,,2009-02-05T00:00:00.000Z,0 CVE-2009-0062,https://securityvulnerability.io/vulnerability/CVE-2009-0062,,"Unspecified vulnerability in the Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.2.173.0 allows remote authenticated users to gain privileges via unknown vectors, as demonstrated by escalation from the (1) Lobby Admin and (2) Local Management User privilege levels.",Cisco,"Wireless Lan Controller Software,Catalyst 6500 Wireless Services Modules,Catalyst 3750 Series Integrated Wireless Lan Controller",,,0.0017999999690800905,false,,false,false,false,,,false,false,,2009-02-05T00:00:00.000Z,0 CVE-2009-0058,https://securityvulnerability.io/vulnerability/CVE-2009-0058,,"The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.2 allow remote attackers to cause a denial of service (web authentication outage or device reload) via unspecified network traffic, as demonstrated by a vulnerability scanner.",Cisco,"Wireless Lan Controller Software,Catalyst 6500 Series Integrated Wireless Lan Controller,Catalyst 3750 Series Integrated Wireless Lan Controller,Catalyst 7600 Series Wireless Lan Controller,4400 Wireless Lan Controller",,,0.004490000195801258,false,,false,false,false,,,false,false,,2009-02-05T00:00:00.000Z,0 CVE-2007-5134,https://securityvulnerability.io/vulnerability/CVE-2007-5134,,"Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended.",Cisco,"Catalyst 6500 Ws-svc-nam-2,Catalyst 7600 Ws-svc-nam-1,Catalyst 7600,Catalyst 7600 Ws-svc-nam-2,Catos,Catalyst 6500 Ws-x6380-nam,Catalyst 7600 Ws-x6380-nam,Catalyst 6500,Catalyst 6500 Ws-svc-nam-1",,,0.010359999723732471,false,,false,false,false,,,false,false,,2007-09-27T19:00:00.000Z,0 CVE-2007-1258,https://securityvulnerability.io/vulnerability/CVE-2007-1258,,"Unspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a denial of service (software reload) via a certain MPLS packet.",Cisco,"Catalyst 7600,Catalyst 6500,Catalyst 6000",,,0.020320000126957893,false,,false,false,false,,,false,false,,2007-03-03T20:00:00.000Z,0 CVE-2005-4258,https://securityvulnerability.io/vulnerability/CVE-2005-4258,,"Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.",Cisco,"Catalyst 2980g-a,Catalyst 4000,Catalyst 2926,Catalyst 6500 Ws-svc-nam-2,Catalyst 7600 Ws-svc-nam-1,Catos,Catalyst 1200 Series,Catalyst 7600,Catalyst 4908g-l3,Catalyst 6000 Ws-svc-nam-2,Catalyst 3200,Catalyst 7600 Ws-svc-nam-2,Catalyst 4948,Catalyst 2950 Lre,Catalyst 2940,Catalyst 4500,Catalyst 5000,Catalyst Ws-c2924-xl,Catalyst 2920,Catalyst 2901,Catalyst 6000,Catalyst 2970,Catalyst 6000 Ws-svc-nam-1,Catalyst 4506,Catalyst 6624,Catalyst,Catalyst 6000 Ws-x6380-nam,Catalyst 8510msr,Ios,Catalyst 5505,Catalyst 4200,Catalyst 2800 Series,Catalyst 2955,Catalyst 6500 Ws-x6380-nam,Catalyst 4912g,Catalyst 2820,Catalyst 5509,Catalyst 2926f,Catalyst 2926gl,Catalyst 2900,Catalyst 2948,Catalyst 6608,Catalyst 8540csr,Catalyst 2902,Catalyst 3900,Catalyst 4224,Catalyst 7600 Ws-x6380-nam,Catalyst 3750,Catalyst 8540msr,Catalyst 3550,Catalyst 2980g,Catalyst 4840g,Catalyst 4510r,Catalyst 3750 Metro,Catalyst 8500,Catalyst 8510csr,Catalyst 3000,Catalyst 6500,Catalyst 6500 Ws-svc-nam-1,Catalyst 1900 Series,Catalyst 2948g-l3,Catalyst 4232,Catalyst 4503,Catalyst 2950,Catalyst 2926gs,Catalyst 3560,Catalyst 2948-ge-tx,Catalyst 4232-13,Catalyst 2926t,Catalyst 4507r,Catalyst 3500 Xl",,,0.0021899999119341373,false,,false,false,false,,,false,false,,2005-12-15T11:00:00.000Z,0 CVE-2003-1001,https://securityvulnerability.io/vulnerability/CVE-2003-1001,,Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.,Cisco,"Catalyst 6500 Ws-svc-nam-2,Catalyst 7600 Ws-svc-nam-1,Firewall Services Module,Catalyst 7600 Ws-svc-nam-2,Catos,Catalyst 6500 Ws-x6380-nam,Catalyst 7600 Ws-x6380-nam,Catalyst 6500,Catalyst 6500 Ws-svc-nam-1",,,0.0016199999954551458,false,,false,false,false,,,false,false,,2004-01-05T05:00:00.000Z,0 CVE-2003-1002,https://securityvulnerability.io/vulnerability/CVE-2003-1002,,Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.,Cisco,"Catalyst 6500 Ws-svc-nam-2,Catalyst 7600 Ws-svc-nam-1,Firewall Services Module,Catalyst 7600 Ws-svc-nam-2,Catos,Catalyst 6500 Ws-x6380-nam,Catalyst 7600 Ws-x6380-nam,Catalyst 6500,Catalyst 6500 Ws-svc-nam-1",,,0.0016199999954551458,false,,false,false,false,,,false,false,,2004-01-05T05:00:00.000Z,0