Page 102 of 517 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Cisco Catalyst 2900 Virtual LAN (VLAN) switches allow remote attackers to inject 802.1q frames into another VLAN by forging the VLAN identifier in the trunking tag. • http://www.cisco.com/univercd/cc/td/doc/product/lan/28201900/1928v8x/eescg8x/aleakyv.htm http://www.securityfocus.com/archive/1/26008 http://www.securityfocus.com/bid/615 https://exchange.xforce.ibmcloud.com/vulnerabilities/3294 •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Cisco Gigabit Switch routers running IOS allow remote attackers to forward unauthorized packets due to improper handling of the "established" keyword in an access list. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0775 •

CVSS: 5.0EPSS: 1%CPEs: 12EXPL: 0

In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters. • http://www.osvdb.org/1104 •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 1

Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port. • https://www.exploit-db.com/exploits/19531 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0063 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

The "established" keyword in some Cisco IOS software allowed an attacker to bypass filtering. • https://www.cve.org/CVERecord?id=CVE-1999-0162 •