Page 66 of 329 results (0.010 seconds)

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 0

Some classic Cisco IOS devices have a vulnerability in the PPP CHAP authentication to establish unauthorized PPP connections. • http://www.osvdb.org/1099 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering. • http://www.osvdb.org/797 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Vulnerability in Cisco routers versions 8.2 through 9.1 allows remote attackers to bypass access control lists when extended IP access lists are used on certain interfaces, the IP route cache is enabled, and the access list uses the "established" keyword. • http://www.cert.org/advisories/CA-1992-20.html http://www.securityfocus.com/bid/53 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the "established" keyword is set, which could allow attackers to bypass filters. • http://www.cert.org/advisories/CA-1992-20.html •