Page 66 of 328 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering. • http://www.osvdb.org/797 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the "established" keyword is set, which could allow attackers to bypass filters. • http://www.cert.org/advisories/CA-1992-20.html •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Vulnerability in Cisco routers versions 8.2 through 9.1 allows remote attackers to bypass access control lists when extended IP access lists are used on certain interfaces, the IP route cache is enabled, and the access list uses the "established" keyword. • http://www.cert.org/advisories/CA-1992-20.html http://www.securityfocus.com/bid/53 •