Page 85 of 423 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering. • http://www.osvdb.org/797 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Vulnerability in Cisco routers versions 8.2 through 9.1 allows remote attackers to bypass access control lists when extended IP access lists are used on certain interfaces, the IP route cache is enabled, and the access list uses the "established" keyword. • http://www.cert.org/advisories/CA-1992-20.html http://www.securityfocus.com/bid/53 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the "established" keyword is set, which could allow attackers to bypass filters. • http://www.cert.org/advisories/CA-1992-20.html •