
CVE-2003-0647 – Cisco IOS 12.x/11.x - HTTP Remote Integer Overflow
https://notcve.org/view.php?id=CVE-2003-0647
05 Aug 2003 — Buffer overflow in the HTTP server for Cisco IOS 12.2 and earlier allows remote attackers to execute arbitrary code via an extremely long (2GB) HTTP GET request. Desbordamiento de búfer en el servidor HTTP de Cisco IOS 12.2 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante una petición HTTP GET extremadamente larga (2GB). • https://www.exploit-db.com/exploits/77 •

CVE-2003-0511 – Cisco Aironet AP1x00 - GET Denial of Service
https://notcve.org/view.php?id=CVE-2003-0511
29 Jul 2003 — The web server for Cisco Aironet AP1x00 Series Wireless devices running certain versions of IOS 12.2 allow remote attackers to cause a denial of service (reload) via a malformed URL. El servidor web de dispostivos inalámbiricos Cisco Aironet AP1x00 Series corriendo ciertos versiones de IOS 12.2 permite a atacantes remotos causar una denegación de servicio (recarga) mediante una URL malformada. • https://www.exploit-db.com/exploits/22962 •

CVE-2003-0512
https://notcve.org/view.php?id=CVE-2003-0512
29 Jul 2003 — Cisco IOS 12.2 and earlier generates a "% Login invalid" message instead of prompting for a password when an invalid username is provided, which allows remote attackers to identify valid usernames on the system and conduct brute force password guessing, as reported for the Aironet Bridge. Cisco IOS 12.2 y anteriores genera un mensaje "% Login Invalid" en vez de solicitar una contraseña cuando se suministra un nombre de usuario inválido, lo que permite a atacantes remotos identificar nombres de usuario válid... • http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0056.html • CWE-310: Cryptographic Issues •

CVE-2003-0567 – Cisco IOS - 'cisco-bug-44020.c' IPv4 Packet Denial of Service
https://notcve.org/view.php?id=CVE-2003-0567
25 Jul 2003 — Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full. Cisco IOS 11.x y 12.0 a 12.2 permite a atacantes remotos causar una denegación de servicio (bloqueo de tráfico) enviando una cierta secuencia de paquetes IPv4 a una interfaz del dispositivo, causando que la cola de entrada de ese interfaz sea marcada como llena. • https://www.exploit-db.com/exploits/60 • CWE-20: Improper Input Validation •

CVE-2003-0305
https://notcve.org/view.php?id=CVE-2003-0305
17 May 2003 — The Service Assurance Agent (SAA) in Cisco IOS 12.0 through 12.2, aka Response Time Reporter (RTR), allows remote attackers to cause a denial of service (crash) via malformed RTR packets to port 1967. El Service Assurance Agent (SAA) en Cisco IOS 12.0 hasta 12.2, también llamado Reponse Time Reporter (RTR), permite que atacantes remotos provoquen una denegación de servicio (caída) mediante paquetes RTR mal construidos para el puerto 1967. • http://www.cisco.com/warp/public/707/cisco-sa-20030515-saa.shtml •

CVE-2003-0100 – Cisco IOS 11/12 - OSPF Neighbor Buffer Overflow
https://notcve.org/view.php?id=CVE-2003-0100
03 Mar 2003 — Buffer overflow in Cisco IOS 11.2.x to 12.0.x allows remote attackers to cause a denial of service and possibly execute commands via a large number of OSPF neighbor announcements. Cisco IOS 11.2.x a 12.0.x permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar comandos mediante un número grande de de anuncios de vecindad OSPF. • https://www.exploit-db.com/exploits/22271 •

CVE-2002-2052
https://notcve.org/view.php?id=CVE-2002-2052
31 Dec 2002 — Cisco 2611 router running IOS 12.1(6.5), possibly an interim release, allows remote attackers to cause a denial of service via port scans such as (1) scanning all ports on a single host and (2) scanning a network of hosts for a single open port through the router. NOTE: the vendor could not reproduce this issue, saying that the original reporter was using an interim release of the software. • http://archives.neohapsis.com/archives/bugtraq/2002-06/0027.html •

CVE-2002-1768
https://notcve.org/view.php?id=CVE-2002-1768
31 Dec 2002 — Cisco IOS 11.1 through 12.2, when HSRP support is not enabled, allows remote attackers to cause a denial of service (CPU consumption) via randomly sized UDP packets to the Hot Standby Routing Protocol (HSRP) port 1985. • http://archives.neohapsis.com/archives/bugtraq/2002-06/0027.html •

CVE-2002-2239
https://notcve.org/view.php?id=CVE-2002-2239
31 Dec 2002 — The Cisco Optical Service Module (OSM) for the Catalyst 6500 and 7600 series running Cisco IOS 12.1(8)E through 12.1(13.4)E allows remote attackers to cause a denial of service (hang) via a malformed packet. • http://www.cisco.com/warp/public/707/osm-lc-ios-pkt-vuln-pub.shtml • CWE-20: Improper Input Validation •

CVE-2002-2208
https://notcve.org/view.php?id=CVE-2002-2208
31 Dec 2002 — Extended Interior Gateway Routing Protocol (EIGRP), as implemented in Cisco IOS 11.3 through 12.2 and other products, allows remote attackers to cause a denial of service (flood) by sending a large number of spoofed EIGRP neighbor announcements, which results in an ARP storm on the local network. • http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/040330.html •