Page 43 of 430 results (0.015 seconds)

CVSS: 7.5EPSS: 1%CPEs: 12EXPL: 0

01 Apr 1999 — In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters. • http://www.osvdb.org/1104 •

CVSS: 9.1EPSS: 0%CPEs: 12EXPL: 1

11 Jan 1999 — Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port. • https://www.exploit-db.com/exploits/19531 •

CVSS: 9.1EPSS: 1%CPEs: 1EXPL: 0

01 Sep 1998 — The "established" keyword in some Cisco IOS software allowed an attacker to bypass filtering. • https://www.cve.org/CVERecord?id=CVE-1999-0162 •

CVSS: 7.5EPSS: 2%CPEs: 5EXPL: 0

18 Aug 1998 — Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service. • http://www.osvdb.org/1097 •

CVSS: 7.5EPSS: 2%CPEs: 16EXPL: 0

12 Aug 1998 — Attackers can crash a Cisco IOS router or device, provided they can get to an interactive prompt (such as a login). This applies to some IOS 9.x, 10.x, and 11.x releases. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0159 •

CVSS: 9.8EPSS: 2%CPEs: 3EXPL: 0

15 Dec 1997 — Buffer overflow in Cisco 7xx routers through the telnet service. • http://www.osvdb.org/1102 •

CVSS: 9.8EPSS: 1%CPEs: 7EXPL: 0

01 Oct 1997 — Some classic Cisco IOS devices have a vulnerability in the PPP CHAP authentication to establish unauthorized PPP connections. • http://www.osvdb.org/1099 •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

31 Jul 1995 — In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering. • http://www.osvdb.org/797 •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

10 Dec 1992 — Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the "established" keyword is set, which could allow attackers to bypass filters. • http://www.cert.org/advisories/CA-1992-20.html •

CVSS: 9.1EPSS: 0%CPEs: 4EXPL: 0

10 Dec 1992 — Vulnerability in Cisco routers versions 8.2 through 9.1 allows remote attackers to bypass access control lists when extended IP access lists are used on certain interfaces, the IP route cache is enabled, and the access list uses the "established" keyword. • http://www.cert.org/advisories/CA-1992-20.html •