cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-12671,https://securityvulnerability.io/vulnerability/CVE-2019-12671,Cisco IOS XE Software Consent Token Bypass Vulnerability,"A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS). The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the CLI and requesting shell access on an affected device. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS.",Cisco,Cisco iOS Xe Software 3.2.9sg,6.7,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-09-16T21:18:07.000Z,,false,false,,2019-09-25T00:00:00.000Z,0 CVE-2019-12669,https://securityvulnerability.io/vulnerability/CVE-2019-12669,Cisco IOS and IOS XE Software Change of Authorization Denial of Service Vulnerability,"A vulnerability in the RADIUS Change of Authorization (CoA) code of Cisco TrustSec, a feature within Cisco IOS XE Software, could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of a malformed packet. An attacker could exploit this vulnerability by sending a malformed packet to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device.",Cisco,Cisco iOS Xe Software 3.2.9sg,6.8,MEDIUM,0.0015899999998509884,false,,false,false,true,2024-09-17T04:17:36.000Z,,false,false,,2019-09-25T00:00:00.000Z,0