CVE-2000-0984 – Cisco IOS 12 - Software '?/' HTTP Request Denial of Service
https://notcve.org/view.php?id=CVE-2000-0984
The HTTP server in Cisco IOS 12.0 through 12.1 allows local users to cause a denial of service (crash and reload) via a URL containing a "?/" string. • https://www.exploit-db.com/exploits/20323 http://www.cisco.com/warp/public/707/ioshttpserverquery-pub.shtml http://www.securityfocus.com/bid/1838 https://exchange.xforce.ibmcloud.com/vulnerabilities/5412 •
CVE-2000-0700
https://notcve.org/view.php?id=CVE-2000-0700
Cisco Gigabit Switch Routers (GSR) with Fast Ethernet / Gigabit Ethernet cards, from IOS versions 11.2(15)GS1A up to 11.2(19)GS0.2 and some versions of 12.0, do not properly handle line card failures, which allows remote attackers to bypass ACLs or force the interface to stop forwarding packets. • http://www.cisco.com/warp/public/707/gsraclbypassdos-pub.shtml http://www.osvdb.org/793 http://www.osvdb.org/798 http://www.securityfocus.com/bid/1541 •
CVE-2000-0345
https://notcve.org/view.php?id=CVE-2000-0345
The on-line help system options in Cisco routers allows non-privileged users without "enabled" access to obtain sensitive information via the show command. • http://www.securityfocus.com/bid/1161 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail%40securityfocus.com •
CVE-2000-0380 – Cisco IOS 11.x/12.x - HTTP %%
https://notcve.org/view.php?id=CVE-2000-0380
The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string. • https://www.exploit-db.com/exploits/19882 http://archives.neohapsis.com/archives/bugtraq/2000-04/0261.html http://www.cisco.com/warp/public/707/ioshttpserver-pub.shtml http://www.osvdb.org/1302 http://www.securityfocus.com/bid/1154 • CWE-20: Improper Input Validation •
CVE-2000-0268
https://notcve.org/view.php?id=CVE-2000-0268
Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot. • http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml http://www.osvdb.org/1289 http://www.securityfocus.com/bid/1123 •