cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2012-5037,https://securityvulnerability.io/vulnerability/CVE-2012-5037,,"The ACL implementation in Cisco IOS before 15.1(1)SY on Catalyst 6500 and 7600 devices allows local users to cause a denial of service (device reload) via a ""no object-group"" command followed by an object-group command, aka Bug ID CSCts16133.",Cisco,"Ios,Catalyst 6500,Catalyst 7600",,,0.0006799999973736703,false,,false,false,false,,,false,false,,2014-04-23T10:00:00.000Z,0 CVE-2012-4662,https://securityvulnerability.io/vulnerability/CVE-2012-4662,,"The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.13) and the Firewall Services Module (FWSM) 4.1 before 4.1(7) in Cisco Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via a crafted DCERPC packet, aka Bug IDs CSCtr21376 and CSCtr27524.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,7600 Router,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.01923000067472458,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2012-4663,https://securityvulnerability.io/vulnerability/CVE-2012-4663,,"The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.13) and the Firewall Services Module (FWSM) 4.1 before 4.1(7) in Cisco Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via a crafted DCERPC packet, aka Bug IDs CSCtr21346 and CSCtr27521.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,7600 Router,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.01923000067472458,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2012-4661,https://securityvulnerability.io/vulnerability/CVE-2012-4661,,"Stack-based buffer overflow in the DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.34), 8.4 before 8.4(4.4), 8.5 before 8.5(1.13), and 8.6 before 8.6(1.3) and the Firewall Services Module (FWSM) 4.1 before 4.1(9) in Cisco Catalyst 6500 series switches and 7600 series routers might allow remote attackers to execute arbitrary code via a crafted DCERPC packet, aka Bug IDs CSCtr21359 and CSCtr27522.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,7600 Router,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.08340000361204147,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2011-3304,https://securityvulnerability.io/vulnerability/CVE-2011-3304,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.2 before 7.2(5.3), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2), and 8.5 before 8.5(1.1) allow remote attackers to cause a denial of service (device reload) via crafted MSN Instant Messenger traffic, aka Bug ID CSCtl67486.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Asa 5500,Catalyst 6500,Catalyst 7600",,,0.00675999978557229,false,,false,false,false,,,false,false,,2011-10-06T10:00:00.000Z,0 CVE-2011-3296,https://securityvulnerability.io/vulnerability/CVE-2011-3296,,"Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875.",Cisco,"Firewall Services Module Software,Catalyst 6500,Catalyst 7600",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2011-10-06T10:00:00.000Z,0 CVE-2011-3297,https://securityvulnerability.io/vulnerability/CVE-2011-3297,,"Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697.",Cisco,"Firewall Services Module Software,Catalyst 6500,Catalyst 7600",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2011-10-06T10:00:00.000Z,0 CVE-2009-0061,https://securityvulnerability.io/vulnerability/CVE-2009-0061,,"Unspecified vulnerability in the Wireless LAN Controller (WLC) TSEC driver in the Cisco 4400 WLC, Cisco Catalyst 6500 and 7600 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.1 allows remote attackers to cause a denial of service (device crash or hang) via unknown IP packets.",Cisco,"Catalyst 6500 Series Integrated Wireless Lan Controller,Wireless Lan Controller Software,4400 Wireless Lan Controller,Catalyst 3750 Series Integrated Wireless Lan Controller,Catalyst 7600 Series Wireless Lan Controller",,,0.00675999978557229,false,,false,false,false,,,false,false,,2009-02-05T00:00:00.000Z,0 CVE-2009-0058,https://securityvulnerability.io/vulnerability/CVE-2009-0058,,"The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.2 allow remote attackers to cause a denial of service (web authentication outage or device reload) via unspecified network traffic, as demonstrated by a vulnerability scanner.",Cisco,"Wireless Lan Controller Software,Catalyst 6500 Series Integrated Wireless Lan Controller,Catalyst 3750 Series Integrated Wireless Lan Controller,Catalyst 7600 Series Wireless Lan Controller,4400 Wireless Lan Controller",,,0.004490000195801258,false,,false,false,false,,,false,false,,2009-02-05T00:00:00.000Z,0 CVE-2009-0059,https://securityvulnerability.io/vulnerability/CVE-2009-0059,,"The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.2.x before 5.2.157.0 allow remote attackers to cause a denial of service (device reload) via a web authentication (aka WebAuth) session that includes a malformed POST request to login.html.",Cisco,"Wireless Lan Controller Software,Catalyst 6500 Series Integrated Wireless Lan Controller,Catalyst 3750 Series Integrated Wireless Lan Controller,Catalyst 7600 Series Wireless Lan Controller,4400 Wireless Lan Controller",,,0.00675999978557229,false,,false,false,false,,,false,false,,2009-02-05T00:00:00.000Z,0 CVE-2007-5134,https://securityvulnerability.io/vulnerability/CVE-2007-5134,,"Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended.",Cisco,"Catalyst 6500 Ws-svc-nam-2,Catalyst 7600 Ws-svc-nam-1,Catalyst 7600,Catalyst 7600 Ws-svc-nam-2,Catos,Catalyst 6500 Ws-x6380-nam,Catalyst 7600 Ws-x6380-nam,Catalyst 6500,Catalyst 6500 Ws-svc-nam-1",,,0.010359999723732471,false,,false,false,false,,,false,false,,2007-09-27T19:00:00.000Z,0 CVE-2007-1258,https://securityvulnerability.io/vulnerability/CVE-2007-1258,,"Unspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a denial of service (software reload) via a certain MPLS packet.",Cisco,"Catalyst 7600,Catalyst 6500,Catalyst 6000",,,0.020320000126957893,false,,false,false,false,,,false,false,,2007-03-03T20:00:00.000Z,0 CVE-2005-4258,https://securityvulnerability.io/vulnerability/CVE-2005-4258,,"Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.",Cisco,"Catalyst 2980g-a,Catalyst 4000,Catalyst 2926,Catalyst 6500 Ws-svc-nam-2,Catalyst 7600 Ws-svc-nam-1,Catos,Catalyst 1200 Series,Catalyst 7600,Catalyst 4908g-l3,Catalyst 6000 Ws-svc-nam-2,Catalyst 3200,Catalyst 7600 Ws-svc-nam-2,Catalyst 4948,Catalyst 2950 Lre,Catalyst 2940,Catalyst 4500,Catalyst 5000,Catalyst Ws-c2924-xl,Catalyst 2920,Catalyst 2901,Catalyst 6000,Catalyst 2970,Catalyst 6000 Ws-svc-nam-1,Catalyst 4506,Catalyst 6624,Catalyst,Catalyst 6000 Ws-x6380-nam,Catalyst 8510msr,Ios,Catalyst 5505,Catalyst 4200,Catalyst 2800 Series,Catalyst 2955,Catalyst 6500 Ws-x6380-nam,Catalyst 4912g,Catalyst 2820,Catalyst 5509,Catalyst 2926f,Catalyst 2926gl,Catalyst 2900,Catalyst 2948,Catalyst 6608,Catalyst 8540csr,Catalyst 2902,Catalyst 3900,Catalyst 4224,Catalyst 7600 Ws-x6380-nam,Catalyst 3750,Catalyst 8540msr,Catalyst 3550,Catalyst 2980g,Catalyst 4840g,Catalyst 4510r,Catalyst 3750 Metro,Catalyst 8500,Catalyst 8510csr,Catalyst 3000,Catalyst 6500,Catalyst 6500 Ws-svc-nam-1,Catalyst 1900 Series,Catalyst 2948g-l3,Catalyst 4232,Catalyst 4503,Catalyst 2950,Catalyst 2926gs,Catalyst 3560,Catalyst 2948-ge-tx,Catalyst 4232-13,Catalyst 2926t,Catalyst 4507r,Catalyst 3500 Xl",,,0.0021899999119341373,false,,false,false,false,,,false,false,,2005-12-15T11:00:00.000Z,0 CVE-2003-1001,https://securityvulnerability.io/vulnerability/CVE-2003-1001,,Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.,Cisco,"Catalyst 6500 Ws-svc-nam-2,Catalyst 7600 Ws-svc-nam-1,Firewall Services Module,Catalyst 7600 Ws-svc-nam-2,Catos,Catalyst 6500 Ws-x6380-nam,Catalyst 7600 Ws-x6380-nam,Catalyst 6500,Catalyst 6500 Ws-svc-nam-1",,,0.0016199999954551458,false,,false,false,false,,,false,false,,2004-01-05T05:00:00.000Z,0 CVE-2003-1002,https://securityvulnerability.io/vulnerability/CVE-2003-1002,,Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.,Cisco,"Catalyst 6500 Ws-svc-nam-2,Catalyst 7600 Ws-svc-nam-1,Firewall Services Module,Catalyst 7600 Ws-svc-nam-2,Catos,Catalyst 6500 Ws-x6380-nam,Catalyst 7600 Ws-x6380-nam,Catalyst 6500,Catalyst 6500 Ws-svc-nam-1",,,0.0016199999954551458,false,,false,false,false,,,false,false,,2004-01-05T05:00:00.000Z,0