Page 18 of 89 results (0.008 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Cisco Gigabit Switch routers running IOS allow remote attackers to forward unauthorized packets due to improper handling of the "established" keyword in an access list. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0775 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

The "established" keyword in some Cisco IOS software allowed an attacker to bypass filtering. • https://www.cve.org/CVERecord?id=CVE-1999-0162 •

CVSS: 5.0EPSS: 2%CPEs: 16EXPL: 0

Attackers can crash a Cisco IOS router or device, provided they can get to an interactive prompt (such as a login). This applies to some IOS 9.x, 10.x, and 11.x releases. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0159 •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 0

Some classic Cisco IOS devices have a vulnerability in the PPP CHAP authentication to establish unauthorized PPP connections. • http://www.osvdb.org/1099 •