Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco ios 12.2t vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-1115
The Session Initiation Protocol (SIP) implementation in Nortel Networks Succession Communication Server 2000, when using SIP-T, allows remote malicious users to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG...
Nortel Succession Communication Server 2000
NA
CVE-2003-1113
The Session Initiation Protocol (SIP) implementation in IPTel SIP Express Router 0.8.9 and previous versions allows remote malicious users to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip tes...
Iptel Sip Express Router 0.8.9
Iptel Sip Express Router 0.8.8
NA
CVE-2005-1057
Cisco IOS 12.2T, 12.3 and 12.3T, when using Easy VPN Server XAUTH version 6 authentication, allows remote malicious users to bypass authentication via a "malformed packet."
Cisco Ios 12.2t
Cisco Ios 12.3
Cisco Ios 12.3t
NA
CVE-2005-1058
Cisco IOS 12.2T, 12.3 and 12.3T, when processing an ISAKMP profile that specifies XAUTH authentication after Phase 1 negotiation, may not process certain attributes in the ISAKMP profile that specifies XAUTH, which allows remote malicious users to bypass XAUTH and move to Phase 2...
Cisco Ios 12.2t
Cisco Ios 12.3
Cisco Ios 12.3t
NA
CVE-2003-1114
The Session Initiation Protocol (SIP) implementation in Mediatrix Telecom VoIP Access Devices and Gateways running SIPv2.4 and SIPv4.3 firmware allows remote malicious users to cause a denial of service or execute arbitrary code via crafted INVITE messages, as demonstrated by the...
Mediatrix Telecom Voip Access Devices And Gateways Sipv2.3
Mediatrix Telecom Voip Access Devices And Gateways Sipv2.4
NA
CVE-2004-0054
Multiple vulnerabilities in the H.323 protocol implementation for Cisco IOS 11.3T up to and including 12.2T allow remote malicious users to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.
Cisco Ios 12.0t
Cisco Ios 12.1
Cisco Ios 12.1e
Cisco Ios 12.1t
Cisco Ios 12.0
Cisco Ios 12.0s
Cisco Ios 11.3t
Cisco Ios 12.2
Cisco Ios 12.2s
Cisco Ios 12.2t
NA
CVE-2005-0197
Cisco IOS 12.1T, 12.2, 12.2T, 12.3 and 12.3T, with Multi Protocol Label Switching (MPLS) installed but disabled, allows remote malicious users to cause a denial of service (device reload) via a crafted packet sent to the disabled interface.
Cisco Ios 12.1t
Cisco Ios 12.2
Cisco Ios 12.2t
Cisco Ios 12.3
Cisco Ios 12.3t
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8