Filtered by vendor Cisco
Subscribe
Total
6186 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2006-4098 | 1 Cisco | 1 Secure Access Control Server | 2024-11-21 | 10.0 HIGH | N/A |
Stack-based buffer overflow in the CSRadius service in Cisco Secure Access Control Server (ACS) for Windows before 4.1 and ACS Solution Engine before 4.1 allows remote attackers to execute arbitrary code via a crafted RADIUS Accounting-Request packet. | |||||
CVE-2006-4097 | 1 Cisco | 1 Secure Access Control Server | 2024-11-21 | 7.8 HIGH | N/A |
Multiple unspecified vulnerabilities in the CSRadius service in Cisco Secure Access Control Server (ACS) for Windows before 4.1 and ACS Solution Engine before 4.1 allow remote attackers to cause a denial of service (crash) via a crafted RADIUS Access-Request packet. NOTE: it has been reported that at least one issue is a heap-based buffer overflow involving the Tunnel-Password attribute. | |||||
CVE-2006-4032 | 1 Cisco | 1 Callmanager Express | 2024-11-21 | 5.0 MEDIUM | N/A |
Unspecified vulnerability in Cisco IOS CallManager Express (CME) allows remote attackers to gain sensitive information (user names) from the Session Initiation Protocol (SIP) user directory via certain SIP messages, aka bug CSCse92417. | |||||
CVE-2006-3906 | 1 Cisco | 21 Adaptive Security Appliance Software, Ios, Pix Asa Ids and 18 more | 2024-11-21 | 5.0 MEDIUM | N/A |
Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected. | |||||
CVE-2006-3734 | 1 Cisco | 1 Cs-mars | 2024-11-21 | 7.2 HIGH | N/A |
Multiple unspecified vulnerabilities in the Command Line Interface (CLI) for Cisco Security Monitoring, Analysis and Response System (CS-MARS) before 4.2.1, allow local CS-MARS administrators to execute arbitrary commands as root. | |||||
CVE-2006-3733 | 1 Cisco | 1 Security Monitoring Analysis And Response System | 2024-11-21 | 7.5 HIGH | N/A |
jmx-console/HtmlAdaptor in the jmx-console in the JBoss web application server, as shipped with Cisco Security Monitoring, Analysis and Response System (CS-MARS) before 4.2.1, allows remote attackers to gain privileges as the CS-MARS administrator and execute arbitrary Java code via an invokeOp action in the BSHDeployer jboss.scripts service name. | |||||
CVE-2006-3732 | 1 Cisco | 1 Cs-mars | 2024-11-21 | 5.0 MEDIUM | N/A |
Cisco Security Monitoring, Analysis and Response System (CS-MARS) before 4.2.1 ships with an Oracle database that contains several default accounts and passwords, which allows attackers to obtain sensitive information. | |||||
CVE-2006-3596 | 1 Cisco | 1 Ips Sensor Software | 2024-11-21 | 5.0 MEDIUM | N/A |
The device driver for Intel-based gigabit network adapters in Cisco Intrusion Prevention System (IPS) 5.1(1) through 5.1(p1), as installed on various Cisco Intrusion Prevention System 42xx appliances, allows remote attackers to cause a denial of service (kernel panic and possibly network outage) via a crafted IP packet. | |||||
CVE-2006-3595 | 1 Cisco | 1 Router Web Setup | 2024-11-21 | 7.5 HIGH | N/A |
The default configuration of IOS HTTP server in Cisco Router Web Setup (CRWS) before 3.3.0 build 31 does not require credentials, which allows remote attackers to access the server with arbitrary privilege levels, aka bug CSCsa78190. | |||||
CVE-2006-3594 | 1 Cisco | 1 Unified Callmanager | 2024-11-21 | 7.5 HIGH | N/A |
Buffer overflow in Cisco Unified CallManager (CUCM) 5.0(1) through 5.0(3a) allows remote attackers to execute arbitrary code via a long hostname in a SIP request, aka bug CSCsd96542. | |||||
CVE-2006-3593 | 1 Cisco | 1 Unified Callmanager | 2024-11-21 | 4.0 MEDIUM | N/A |
The command line interface (CLI) in Cisco Unified CallManager (CUCM) 5.0(1) through 5.0(3a) allows local users to overwrite arbitrary files by redirecting a command's output to a file or folder, aka bug CSCse31704. | |||||
CVE-2006-3592 | 1 Cisco | 1 Unified Callmanager | 2024-11-21 | 4.6 MEDIUM | N/A |
Unspecified vulnerability in the command line interface (CLI) in Cisco Unified CallManager (CUCM) 5.0(1) through 5.0(3a) allows local users to execute arbitrary commands with elevated privileges via unspecified vectors, involving "certain CLI commands," aka bug CSCse11005. | |||||
CVE-2006-3291 | 1 Cisco | 1 Ios | 2024-11-21 | 9.3 HIGH | N/A |
The web interface on Cisco IOS 12.3(8)JA and 12.3(8)JA1, as used on the Cisco Wireless Access Point and Wireless Bridge, reconfigures itself when it is changed to use the "Local User List Only (Individual Passwords)" setting, which removes all security and password configurations and allows remote attackers to access the system. | |||||
CVE-2006-3290 | 1 Cisco | 1 Wireless Control System | 2024-11-21 | 5.0 MEDIUM | N/A |
HTTP server in Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(51) stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain usernames and directory paths via a direct URL request. | |||||
CVE-2006-3289 | 1 Cisco | 1 Wireless Control System | 2024-11-21 | 2.6 LOW | N/A |
Cross-site scripting (XSS) vulnerability in the login page of the HTTP interface for the Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(51) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving a "malicious URL". | |||||
CVE-2006-3288 | 1 Cisco | 1 Wireless Control System | 2024-11-21 | 5.0 MEDIUM | N/A |
Unspecified vulnerability in the TFTP server in Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(51), when configured to use a directory path name that contains a space character, allows remote authenticated users to read and overwrite arbitrary files via unspecified vectors. | |||||
CVE-2006-3287 | 1 Cisco | 1 Wireless Control System | 2024-11-21 | 7.5 HIGH | N/A |
Cisco Wireless Control System (WCS) for Linux and Windows 4.0(1) and earlier uses a default administrator username "root" and password "public," which allows remote attackers to gain access (aka bug CSCse21391). | |||||
CVE-2006-3286 | 1 Cisco | 1 Wireless Control System | 2024-11-21 | 7.5 HIGH | N/A |
The internal database in Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(63) stores a hard-coded username and password in plaintext within unspecified files, which allows remote authenticated users to access the database (aka bug CSCsd15951). | |||||
CVE-2006-3285 | 1 Cisco | 1 Wireless Control System | 2024-11-21 | 7.5 HIGH | N/A |
The internal database in Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(51) uses an undocumented, hard-coded username and password, which allows remote authenticated users to read, and possibly modify, sensitive configuration data (aka bugs CSCsd15955). | |||||
CVE-2006-3226 | 1 Cisco | 1 Secure Access Control Server | 2024-11-21 | 7.5 HIGH | N/A |
Cisco Secure Access Control Server (ACS) 4.x for Windows uses the client's IP address and the server's port number to grant access to an HTTP server port for an administration session, which allows remote attackers to bypass authentication via various methods, aka "ACS Weak Session Management Vulnerability." |