Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco ios xe 3.16s 3.16.0s vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2016-1428
Double free vulnerability in Cisco IOS XE 3.15S, 3.16S, and 3.17S allows remote authenticated users to cause a denial of service (device restart) via a sequence of crafted SNMP read requests, aka Bug ID CSCux13174.
Cisco Ios Xe 3.16.0s
Cisco Ios Xe 3.15.0s
Cisco Ios Xe 3.17.0s
6.5
CVSSv3
CVE-2016-1432
Cisco IOS XE 3.15S and 3.16S on cBR-8 Converged Broadband Router devices allows remote authenticated users to cause a denial of service (NULL pointer dereference and card restart) via a crafted SNMP request, aka Bug ID CSCuu68862.
Cisco Ios Xe 3.16.0s
Cisco Ios Xe 3.15.0s
Cisco Ios Xe 3.15.1s
5.9
CVSSv3
CVE-2016-6438
A vulnerability in Cisco IOS XE Software running on Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, remote malicious user to cause a configuration integrity change to the vty line configuration on an affected device. This vulnerability affects the followin...
Cisco Ios Xe 3.16.0s
Cisco Ios Xe 3.16.4s
Cisco Ios Xe 3.17.1as
Cisco Ios Xe 3.16.2s
Cisco Ios Xe 3.16.0cs
Cisco Ios Xe 3.17.2s
Cisco Ios Xe 3.16.1s
Cisco Ios Xe 3.18.0s
Cisco Ios Xe 3.17.0s
Cisco Ios Xe 3.16.3s
Cisco Ios Xe 3.17.1s
Cisco Ios Xe 3.16.2bs
Cisco Ios Xe 3.16.1as
Cisco Ios Xe 3.18.1s
Cisco Ios Xe 3.18.0sp
Cisco Ios Xe 3.16.3as
Cisco Ios Xe 3.16.2as
7.5
CVSSv3
CVE-2017-3856
A vulnerability in the web user interface of Cisco IOS XE 3.1 up to and including 3.17 could allow an unauthenticated, remote malicious user to cause an affected device to reload. The vulnerability is due to insufficient resource handling by the affected software when the web use...
Cisco Ios Xe 3.3.0sq
Cisco Ios Xe 3.13.2s
Cisco Ios Xe 3.2.0sg
Cisco Ios Xe 3.10.6s
Cisco Ios Xe 3.6.5be
Cisco Ios Xe 3.6.2s
Cisco Ios Xe 3.14.4s
Cisco Ios Xe 3.7.2ts
Cisco Ios Xe 3.5.0s
Cisco Ios Xe 3.7.4e
Cisco Ios Xe 3.15.1cs
Cisco Ios Xe 3.9.0e
Cisco Ios Xe 3.13.4s
Cisco Ios Xe 3.4.1s
Cisco Ios Xe 3.4.1sg
Cisco Ios Xe 3.3.1sq
Cisco Ios Xe 3.13.0s
Cisco Ios Xe 3.3.1s
Cisco Ios Xe 3.2.9sg
Cisco Ios Xe 3.6.5ae
Cisco Ios Xe 3.7.1e
Cisco Ios Xe 3.6.4e
7.5
CVSSv3
CVE-2016-1348
Cisco IOS 15.0 up to and including 15.5 and IOS XE 3.3 up to and including 3.16 allow remote malicious users to cause a denial of service (device reload) via a crafted DHCPv6 Relay message, aka Bug ID CSCus55821.
Cisco Ios Xe 3.10s 3.10.3s
Cisco Ios Xe 3.7s 3.7.0s
Cisco Ios Xe 3.7s 3.7.5s
Cisco Ios Xe 3.5e 3.5.2e
Cisco Ios Xe 3.9s 3.9.1s
Cisco Ios Xe 3.5e 3.5.1e
Cisco Ios Xe 3.16s 3.16.0s
Cisco Ios Xe 3.12s 3.12.1s
Cisco Ios Xe 3.7s 3.7.7s
Cisco Ios Xe 3.8s 3.8.1s
Cisco Ios Xe 3.6s 3.6.1s
Cisco Ios Xe 3.6e 3.6.2e
Cisco Ios Xe 3.6e 3.6.1e
Cisco Ios Xe 3.7s 3.7.4s
Samsung X14j Firmware T-ms14jakucb-1102.5
Cisco Ios Xe 3.14s 3.14.0s
Cisco Ios Xe 3.9s 3.9.1as
Cisco Ios Xe 3.12s 3.12.4s
Cisco Ios Xe 3.6e 3.6.0e
Cisco Ios Xe 3.8e 3.8.0e
Cisco Ios Xe 3.16s 3.16.1s
Cisco Ios Xe 3.5s 3.5.0s
5.9
CVSSv3
CVE-2016-1344
The IKEv2 implementation in Cisco IOS 15.0 up to and including 15.6 and IOS XE 3.3 up to and including 3.17 allows remote malicious users to cause a denial of service (device reload) via fragmented packets, aka Bug ID CSCux38417.
Cisco Ios Xe 3.4sg 3.4.2sg
Cisco Ios Xe 3.4sg 3.4.6sg
Cisco Ios Xe 3.10s 3.10.3s
Cisco Ios Xe 3.7s 3.7.0s
Cisco Ios Xe 3.7s 3.7.5s
Cisco Ios Xe 3.5e 3.5.2e
Cisco Ios Xe 3.4s 3.4.6s
Cisco Ios Xe 3.9s 3.9.1s
Cisco Ios Xe 3.7e 3.7.3e
Cisco Ios Xe 3.3s 3.3.2s
Cisco Ios Xe 3.5e 3.5.1e
Cisco Ios Xe 3.16s 3.16.0s
Cisco Ios Xe 3.4sg 3.4.7sg
Cisco Ios Xe 3.12s 3.12.1s
Cisco Ios Xe 3.7s 3.7.7s
Cisco Ios Xe 3.8s 3.8.1s
Cisco Ios Xe 3.6s 3.6.1s
Cisco Ios Xe 3.6e 3.6.2e
Cisco Ios Xe 3.6e 3.6.1e
Cisco Ios Xe 3.7s 3.7.4s
Cisco Ios Xe 3.4s 3.4.0as
Samsung X14j Firmware T-ms14jakucb-1102.5
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started