Filtered by vendor Cisco
Subscriptions
Filtered by product Ios
Subscriptions
Total
598 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2006-4775 | 1 Cisco | 2 Catos, Ios | 2025-04-03 | N/A |
The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context. | ||||
CVE-2006-4776 | 1 Cisco | 1 Ios | 2025-04-03 | N/A |
Heap-based buffer overflow in the VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) allows remote attackers to execute arbitrary code via a long VLAN name in a VTP type 2 summary advertisement. | ||||
CVE-2006-4950 | 1 Cisco | 1 Ios | 2025-04-03 | N/A |
Cisco IOS 12.2 through 12.4 before 20060920, as used by Cisco IAD2430, IAD2431, and IAD2432 Integrated Access Devices, the VG224 Analog Phone Gateway, and the MWR 1900 and 1941 Mobile Wireless Edge Routers, is incorrectly identified as supporting DOCSIS, which allows remote attackers to gain read-write access via a hard-coded cable-docsis community string and read or modify arbitrary SNMP variables. | ||||
CVE-1999-0016 | 6 Cisco, Gnu, Hp and 3 more | 8 Ios, Inet, Hp-ux and 5 more | 2025-04-03 | N/A |
Land IP denial of service. | ||||
CVE-2002-1358 | 7 Cisco, Fissh, Intersoft and 4 more | 7 Ios, Ssh Client, Securenetterm and 4 more | 2025-04-03 | N/A |
Multiple SSH2 servers and clients do not properly handle lists with empty elements or strings, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite. | ||||
CVE-1999-1465 | 1 Cisco | 1 Ios | 2025-04-03 | N/A |
Vulnerability in Cisco IOS 11.1 through 11.3 with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled input interface to an output interface with a logical subinterface, as described by Cisco bug CSCdk43862. | ||||
CVE-1999-1464 | 1 Cisco | 1 Ios | 2025-04-03 | N/A |
Vulnerability in Cisco IOS 11.1CC and 11.1CT with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled interface to an interface that does not have DFS enabled, as described by Cisco bug CSCdk35564. | ||||
CVE-1999-1306 | 1 Cisco | 1 Ios | 2025-04-03 | N/A |
Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the "established" keyword is set, which could allow attackers to bypass filters. | ||||
CVE-1999-1175 | 1 Cisco | 1 Ios | 2025-04-03 | N/A |
Web Cache Control Protocol (WCCP) in Cisco Cache Engine for Cisco IOS 11.2 and earlier does not use authentication, which allows remote attackers to redirect HTTP traffic to arbitrary hosts via WCCP packets to UDP port 2048. | ||||
CVE-1999-1129 | 1 Cisco | 2 Catalyst 2900 Vlan, Ios | 2025-04-03 | N/A |
Cisco Catalyst 2900 Virtual LAN (VLAN) switches allow remote attackers to inject 802.1q frames into another VLAN by forging the VLAN identifier in the trunking tag. | ||||
CVE-1999-0775 | 1 Cisco | 1 Ios | 2025-04-03 | N/A |
Cisco Gigabit Switch routers running IOS allow remote attackers to forward unauthorized packets due to improper handling of the "established" keyword in an access list. | ||||
CVE-1999-0524 | 11 Apple, Cisco, Hp and 8 more | 14 Mac Os X, Macos, Ios and 11 more | 2025-04-03 | N/A |
ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts. | ||||
CVE-1999-0445 | 1 Cisco | 1 Ios | 2025-04-03 | N/A |
In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters. | ||||
CVE-1999-0293 | 1 Cisco | 1 Ios | 2025-04-03 | N/A |
AAA authentication on Cisco systems allows attackers to execute commands without authorization. | ||||
CVE-1999-0230 | 1 Cisco | 1 Ios | 2025-04-03 | N/A |
Buffer overflow in Cisco 7xx routers through the telnet service. | ||||
CVE-1999-0162 | 1 Cisco | 1 Ios | 2025-04-03 | N/A |
The "established" keyword in some Cisco IOS software allowed an attacker to bypass filtering. | ||||
CVE-1999-0161 | 1 Cisco | 1 Ios | 2025-04-03 | N/A |
In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering. | ||||
CVE-1999-0160 | 1 Cisco | 1 Ios | 2025-04-03 | N/A |
Some classic Cisco IOS devices have a vulnerability in the PPP CHAP authentication to establish unauthorized PPP connections. | ||||
CVE-1999-0159 | 1 Cisco | 1 Ios | 2025-04-03 | N/A |
Attackers can crash a Cisco IOS router or device, provided they can get to an interactive prompt (such as a login). This applies to some IOS 9.x, 10.x, and 11.x releases. | ||||
CVE-1999-0157 | 1 Cisco | 2 Ios, Pix Firewall Software | 2025-04-03 | N/A |
Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service. |