Cisco vulnerabilities
Showing 601 - 618 of 618 CVEs
- CVE-1999-1465 Published Dec 31, 1999
Vulnerability in Cisco IOS 11.1 through 11.3 with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled input interface to an output interface with a logical subinterface, as described by Cisco bug CSCdk43862.
- CVE-1999-1464 Published Dec 31, 1999
Vulnerability in Cisco IOS 11.1CC and 11.1CT with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled interface to an interface that does not have DFS enabled, as described by Cisco bug CSCdk35564.
- CVE-1999-1175 Published Dec 31, 1999
Web Cache Control Protocol (WCCP) in Cisco Cache Engine for Cisco IOS 11.2 and earlier does not use authentication, which allows remote attackers to redirect HTTP traffic to arbitrary hosts via WCCP packets to UDP port 2048.
- CVE-1999-1129 Published Sep 1, 1999
Cisco Catalyst 2900 Virtual LAN (VLAN) switches allow remote attackers to inject 802.1q frames into another VLAN by forging the VLAN identifier in the trunking tag.
- CVE-1999-0775 Published Jun 10, 1999
Cisco Gigabit Switch routers running IOS allow remote attackers to forward unauthorized packets due to improper handling of the "established" keyword in an access list.
- CVE-1999-0445 Published Apr 1, 1999
In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters.
- CVE-1999-0063 Published Jan 11, 1999
Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port.
- CVE-1999-0162 Published Sep 1, 1998
The "established" keyword in some Cisco IOS software allowed an attacker to bypass filtering.
- CVE-1999-0157 Published Aug 18, 1998
Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service.
- CVE-1999-0159 Published Aug 12, 1998
Attackers can crash a Cisco IOS router or device, provided they can get to an interactive prompt (such as a login). This applies to some IOS 9.x, 10.x, and 11.x releases.
- CVE-1999-0293 Published Jan 1, 1998
AAA authentication on Cisco systems allows attackers to execute commands without authorization.
- CVE-1999-0230 Published Dec 15, 1997
Buffer overflow in Cisco 7xx routers through the telnet service.
- CVE-1999-0016 Published Dec 1, 1997
Land IP denial of service.
- CVE-1999-0160 Published Oct 1, 1997
Some classic Cisco IOS devices have a vulnerability in the PPP CHAP authentication to establish unauthorized PPP connections.
- CVE-1999-0524 Published Aug 1, 1997
ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.
- CVE-1999-0161 Published Jul 31, 1995
In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering.
- CVE-1999-1466 Published Dec 10, 1992
Vulnerability in Cisco routers versions 8.2 through 9.1 allows remote attackers to bypass access control lists when extended IP access lists are used on certain interfaces, the IP route cache is enabled, and the access list uses the "established" keyword.
- CVE-1999-1306 Published Dec 10, 1992
Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the "established" keyword is set, which could allow attackers to bypass filters.
Vulnerability in Cisco IOS 11.1 through 11.3 with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled input interface to an output interface with a logical subinterface, as described by Cisco bug CSCdk43862.
Vulnerability in Cisco IOS 11.1CC and 11.1CT with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled interface to an interface that does not have DFS enabled, as described by Cisco bug CSCdk35564.
Web Cache Control Protocol (WCCP) in Cisco Cache Engine for Cisco IOS 11.2 and earlier does not use authentication, which allows remote attackers to redirect HTTP traffic to arbitrary hosts via WCCP packets to UDP port 2048.
Cisco Catalyst 2900 Virtual LAN (VLAN) switches allow remote attackers to inject 802.1q frames into another VLAN by forging the VLAN identifier in the trunking tag.
Cisco Gigabit Switch routers running IOS allow remote attackers to forward unauthorized packets due to improper handling of the "established" keyword in an access list.
In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters.
Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port.
The "established" keyword in some Cisco IOS software allowed an attacker to bypass filtering.
Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service.
Attackers can crash a Cisco IOS router or device, provided they can get to an interactive prompt (such as a login). This applies to some IOS 9.x, 10.x, and 11.x releases.
low 3.5
AAA authentication on Cisco systems allows attackers to execute commands without authorization.
Buffer overflow in Cisco 7xx routers through the telnet service.
Land IP denial of service.
Some classic Cisco IOS devices have a vulnerability in the PPP CHAP authentication to establish unauthorized PPP connections.
ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.
In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering.
Vulnerability in Cisco routers versions 8.2 through 9.1 allows remote attackers to bypass access control lists when extended IP access lists are used on certain interfaces, the IP route cache is enabled, and the access list uses the "established" keyword.
Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the "established" keyword is set, which could allow attackers to bypass filters.