Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Ios
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 598 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2000-12-19 | CVE-2000-0984 | The HTTP server in Cisco IOS 12.0 through 12.1 allows local users to cause a denial of service (crash and reload) via a URL containing a "?/" string. | Ios | N/A | ||
2000-10-20 | CVE-2000-0700 | Cisco Gigabit Switch Routers (GSR) with Fast Ethernet / Gigabit Ethernet cards, from IOS versions 11.2(15)GS1A up to 11.2(19)GS0.2 and some versions of 12.0, do not properly handle line card failures, which allows remote attackers to bypass ACLs or force the interface to stop forwarding packets. | Gigabit_switch_router_12008, Gigabit_switch_router_12012, Gigabit_switch_router_12016, Ios | N/A | ||
2000-05-30 | CVE-2000-0486 | Buffer overflow in Cisco TACACS+ tac_plus server allows remote attackers to cause a denial of service via a malformed packet with a long length field. | Ios, Tacacs\+ | N/A | ||
2000-04-26 | CVE-2000-0380 | The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string. | Ios | N/A | ||
2001-03-12 | CVE-2000-0368 | Classic Cisco IOS 9.1 and later allows attackers with access to the login prompt to obtain portions of the command history of previous users, which may allow the attacker to access sensitive data. | Ios | N/A | ||
2000-04-20 | CVE-2000-0268 | Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot. | 3660_router, 7100_router, 7200_router, 7500_router, Accesspath, As5200, As5300, As5800, Ios, System_controller_3640, Ubr7200, Voice_gateway_as5800 | N/A | ||
1992-12-10 | CVE-1999-1466 | Vulnerability in Cisco routers versions 8.2 through 9.1 allows remote attackers to bypass access control lists when extended IP access lists are used on certain interfaces, the IP route cache is enabled, and the access list uses the "established" keyword. | Ios | N/A | ||
1999-12-31 | CVE-1999-1465 | Vulnerability in Cisco IOS 11.1 through 11.3 with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled input interface to an output interface with a logical subinterface, as described by Cisco bug CSCdk43862. | Ios | N/A | ||
1999-12-31 | CVE-1999-1464 | Vulnerability in Cisco IOS 11.1CC and 11.1CT with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled interface to an interface that does not have DFS enabled, as described by Cisco bug CSCdk35564. | Ios | N/A | ||
1992-12-10 | CVE-1999-1306 | Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the "established" keyword is set, which could allow attackers to bypass filters. | Ios | N/A |