cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2007-4430,https://securityvulnerability.io/vulnerability/CVE-2007-4430,,"Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows context-dependent attackers to cause a denial of service (device restart and BGP routing table rebuild) via certain regular expressions in a ""show ip bgp regexp"" command. NOTE: unauthenticated remote attacks are possible in environments with anonymous telnet and Looking Glass access.",Cisco,"Ios,Cli,Ids,Ios Xr,Cbos",,,0.025100000202655792,false,,false,false,false,,,false,false,,2007-08-20T19:00:00.000Z,0 CVE-2006-4910,https://securityvulnerability.io/vulnerability/CVE-2006-4910,,"The web administration interface (mainApp) to Cisco IDS before 4.1(5c), and IPS 5.0 before 5.0(6p1) and 5.1 before 5.1(2) allows remote attackers to cause a denial of service (unresponsive device) via a crafted SSLv2 Client Hello packet.",Cisco,"Ids Sensor Software,Ips Sensor Software",,,0.031190000474452972,false,,false,false,false,,,false,false,,2006-09-21T00:00:00.000Z,0 CVE-2006-3906,https://securityvulnerability.io/vulnerability/CVE-2006-3906,,"Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected.",Cisco,"Ios,Vpn 3001 Concentrator,Vpn 3015 Concentrator,Vpn 3020 Concentrator,Vpn 3030 Concentator,Vpn 3060 Concentrator,Vpn 3080 Concentrator,Adaptive Security Appliance Software,Vpn 3000 Concentrator Series Software,Vpn 3005 Concentrator Software,Pix Asa Ids,Pix Firewall,Pix Firewall 501,Pix Firewall 506,Pix Firewall 515,Pix Firewall 515e,Pix Firewall 520,Pix Firewall 525,Pix Firewall 535,Secure Pix Firewall,Pix Firewall Software",,,0.05920000001788139,false,,false,false,false,,,false,false,,2006-07-27T22:00:00.000Z,0 CVE-2005-4499,https://securityvulnerability.io/vulnerability/CVE-2005-4499,,"The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.",Cisco,"Vpn 3001 Concentrator,Vpn 3015 Concentrator,Vpn 3020 Concentrator,Vpn 3030 Concentator,Vpn 3060 Concentrator,Vpn 3080 Concentrator,Adaptive Security Appliance Software,Vpn 3000 Concentrator Series Software,Vpn 3005 Concentrator Software,Pix Asa Ids,Pix Firewall,Secure Access Control Server,Vpn 3002 Hardware Client,Pix Firewall 501,Pix Firewall 506,Pix Firewall 515,Pix Firewall 515e,Pix Firewall 520,Pix Firewall 525,Pix Firewall 535,Pix Firewall Software",,,0.009530000388622284,false,,false,false,false,,,false,false,,2005-12-22T11:00:00.000Z,0 CVE-2005-2695,https://securityvulnerability.io/vulnerability/CVE-2005-2695,,"Unspecified vulnerability in the SSL certificate checking functionality in Cisco CiscoWorks Management Center for IDS Sensors (IDSMC) 2.0 and 2.1, and Monitoring Center for Security (Security Monitor or Secmon) 1.1 through 2.0 and 2.1, allows remote attackers to spoof a Cisco Intrusion Detection Sensor (IDS) or Intrusion Prevention System (IPS).",Cisco,"Ciscoworks Monitoring Center For Security,Ciscoworks Management Center For Ids Sensors",,,0.003379999892786145,false,,false,false,false,,,false,false,,2005-08-26T15:50:00.000Z,0 CVE-2002-0908,https://securityvulnerability.io/vulnerability/CVE-2002-0908,,Directory traversal vulnerability in the web server for Cisco IDS Device Manager before 3.1.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTPS request.,Cisco,Ids Device Manager,,,0.0065299998968839645,false,,false,false,false,,,false,false,,2002-10-04T04:00:00.000Z,0