Page 18 of 175 results (0.016 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

03 May 2001 — Cisco switches and routers running IOS 12.1 and earlier produce predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections. • https://www.exploit-db.com/exploits/19522 •

CVSS: 7.5EPSS: 0%CPEs: 201EXPL: 0

28 Feb 2001 — Cisco IOS 12.0(5)XU through 12.1(2) allows remote attackers to read system administration and topology information via an "snmp-server host" command, which creates a readable "community" community string if one has not been previously created. • http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

28 Feb 2001 — Cisco IOS 12.1(3) and 12.1(3)T allows remote attackers to read and modify device configuration data via the cable-docsis read-write community string used by the Data Over Cable Service Interface Specification (DOCSIS) standard. • http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml •

CVSS: 5.5EPSS: 0%CPEs: 24EXPL: 2

19 Dec 2000 — The HTTP server in Cisco IOS 12.0 through 12.1 allows local users to cause a denial of service (crash and reload) via a URL containing a "?/" string. • https://www.exploit-db.com/exploits/20323 •

CVSS: 7.5EPSS: 0%CPEs: 18EXPL: 0

13 Oct 2000 — Cisco Gigabit Switch Routers (GSR) with Fast Ethernet / Gigabit Ethernet cards, from IOS versions 11.2(15)GS1A up to 11.2(19)GS0.2 and some versions of 12.0, do not properly handle line card failures, which allows remote attackers to bypass ACLs or force the interface to stop forwarding packets. • http://www.cisco.com/warp/public/707/gsraclbypassdos-pub.shtml •