
CVE-2007-4430 – Cisco IOS 12.3 - Show IP BGP Regexp Remote Denial of Service
https://notcve.org/view.php?id=CVE-2007-4430
20 Aug 2007 — Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows context-dependent attackers to cause a denial of service (device restart and BGP routing table rebuild) via certain regular expressions in a "show ip bgp regexp" command. NOTE: unauthenticated remote attacks are possible in environments with anonymous telnet and Looking Glass access. Una vulnerabilidad no especificada en Cisco IOS versiones 12.0 hasta 12.4, permite a atacantes dependiendo del contexto causar una denegación de servicio (reinicio... • https://www.exploit-db.com/exploits/30506 • CWE-20: Improper Input Validation •

CVE-2002-0886 – Cisco CBOS 2.x - Broadband Operating System TCP/IP Stack Denial of Service
https://notcve.org/view.php?id=CVE-2002-0886
31 Aug 2002 — Cisco DSL CPE devices running CBOS 2.4.4 and earlier allows remote attackers to cause a denial of service (hang or memory consumption) via (1) a large packet to the DHCP port, (2) a large packet to the Telnet port, or (3) a flood of large packets to the CPE, which causes the TCP/IP stack to consume large amounts of memory. • https://www.exploit-db.com/exploits/21472 •

CVE-2001-0751 – Linux Kernel 2.2 - Predictable TCP Initial Sequence Number
https://notcve.org/view.php?id=CVE-2001-0751
18 Oct 2001 — Cisco switches and routers running CBOS 2.3.8 and earlier use predictable TCP Initial Sequence Numbers (ISN), which allows remote attackers to spoof or hijack TCP connections. Conmutadores y routers Cisco corriendo CBOS 2.3.8 usan números iniciales de secuencia TCP (ISN) predecibles, lo que permite a un atacante remoto secuestrar o falsificar conexiones TCP; • https://www.exploit-db.com/exploits/19522 •

CVE-2001-0752
https://notcve.org/view.php?id=CVE-2001-0752
18 Oct 2001 — Cisco CBOS 2.3.8 and earlier allows remote attackers to cause a denial of service via an ICMP ECHO REQUEST (ping) with the IP Record Route option set. Cisco CBOS 2.3.8 y anteriores permiten a atacantes remotos causar una denegación de servicio mediante un paquete ICMP de petición de eco (ping) con la opción trazar ruta activada. • http://www.cisco.com/warp/public/707/CBOS-multiple2-pub.html •

CVE-2001-0754
https://notcve.org/view.php?id=CVE-2001-0754
18 Oct 2001 — Cisco CBOS 2.3.8 and earlier allows remote attackers to cause a denial of service via a series of large ICMP ECHO REPLY (ping) packets, which cause it to enter ROMMON mode and stop forwarding packets. Cisco CBOS 2.3.8 y anteriores permiten a atacantes causar una denegación de servicio mediante una serie de paquetes ICMP de petición de eco (ping) grandes, que les hacen entrar en modo ROMMON y dejar de reenviar paquetes • http://www.cisco.com/warp/public/707/CBOS-multiple2-pub.html •

CVE-2001-0753
https://notcve.org/view.php?id=CVE-2001-0753
12 Oct 2001 — Cisco CBOS 2.3.8 and earlier stores the passwords for (1) exec and (2) enable in cleartext in the NVRAM and a configuration file, which could allow unauthorized users to obtain the passwords and gain privileges. • http://www.cisco.com/warp/public/707/CBOS-multiple2-pub.html •

CVE-2001-1064 – Cisco CBOS 2.x - Multiple TCP Connection Denial of Service Vulnerabilities
https://notcve.org/view.php?id=CVE-2001-1064
31 Aug 2001 — Cisco 600 series routers running CBOS 2.0.1 through 2.4.2ap allows remote attackers to cause a denial of service via multiple connections to the router on the (1) HTTP or (2) telnet service, which causes the router to become unresponsive and stop forwarding packets. • https://www.exploit-db.com/exploits/21092 •

CVE-2001-1065
https://notcve.org/view.php?id=CVE-2001-1065
31 Aug 2001 — Web-based configuration utility in Cisco 600 series routers running CBOS 2.0.1 through 2.4.2ap binds itself to port 80 even when web-based configuration services are disabled, which could leave the router open to attack. • http://www.cisco.com/warp/public/707/cisco-cbos-webserver-pub.shtml •

CVE-2001-0444
https://notcve.org/view.php?id=CVE-2001-0444
02 Jul 2001 — Cisco CBOS 2.3.0.053 sends output of the "sh nat" (aka "show nat") command to the terminal of the next user who attempts to connect to the router via telnet, which could allow that user to obtain sensitive information. • http://archives.neohapsis.com/archives/bugtraq/2001-04/0380.html •