cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2014-2155,https://securityvulnerability.io/vulnerability/CVE-2014-2155,,"The DHCPv6 server module in Cisco CNS Network Registrar 7.1 allows remote attackers to cause a denial of service (daemon reload) via a malformed DHCPv6 packet, aka Bug ID CSCuo07437.",Cisco,Cns Network Registrar,,,0.0018599999602884054,false,,false,false,false,,,false,false,,2014-04-19T21:00:00.000Z,0 CVE-2011-2024,https://securityvulnerability.io/vulnerability/CVE-2011-2024,,"Cisco Network Registrar before 7.2 has a default administrative password, which makes it easier for remote attackers to obtain access via a TCP session, aka Bug ID CSCsm50627.",Cisco,Cns Network Registrar,,,0.011210000142455101,false,,false,false,false,,,false,false,,2011-06-02T20:00:00.000Z,0 CVE-2004-1164,https://securityvulnerability.io/vulnerability/CVE-2004-1164,,"The lock manager in Cisco CNS Network Registrar 6.0 through 6.1.1.3 allows remote attackers to cause a denial of service (process crash) via a certain ""unexpected packet sequence.""",Cisco,Cns Network Registrar,,,0.008229999803006649,false,,false,false,false,,,false,false,,2005-01-10T05:00:00.000Z,0 CVE-2004-1163,https://securityvulnerability.io/vulnerability/CVE-2004-1163,,Cisco CNS Network Registrar Central Configuration Management (CCM) server 6.0 through 6.1.1.3 allows remote attackers to cause a denial of service (CPU consumption) by ending a connection after sending a certain sequence of packets.,Cisco,Cns Network Registrar,,,0.0025100000202655792,false,,false,false,false,,,false,false,,2005-01-10T05:00:00.000Z,0