Page 90 of 456 results (0.014 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Cisco Gigabit Switch routers running IOS allow remote attackers to forward unauthorized packets due to improper handling of the "established" keyword in an access list. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0775 •

CVSS: 5.0EPSS: 1%CPEs: 12EXPL: 0

In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters. • http://www.osvdb.org/1104 •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 1

Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port. • https://www.exploit-db.com/exploits/19531 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0063 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

The "established" keyword in some Cisco IOS software allowed an attacker to bypass filtering. • https://www.cve.org/CVERecord?id=CVE-1999-0162 •

CVSS: 5.0EPSS: 2%CPEs: 5EXPL: 0

Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service. • http://www.osvdb.org/1097 •