Vulnerabilities > Cisco > IOS > 12.0.2.xf
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2003-03-03 | CVE-2003-0100 | Buffer Overflow vulnerability in Cisco IOS OSPF Neighbor Buffer overflow in Cisco IOS 11.2.x to 12.0.x allows remote attackers to cause a denial of service and possibly execute commands via a large number of OSPF neighbor announcements. | 7.5 |
2002-12-31 | CVE-2002-1706 | Improper Verification of Cryptographic Signature vulnerability in Cisco IOS Cisco IOS software 11.3 through 12.2 running on Cisco uBR7200 and uBR7100 series Universal Broadband Routers allows remote attackers to modify Data Over Cable Service Interface Specification (DOCSIS) settings via a DOCSIS file without a Message Integrity Check (MIC) signature, which is approved by the router. | 7.5 |
2001-05-03 | CVE-2001-0288 | Unspecified vulnerability in Cisco IOS Cisco switches and routers running IOS 12.1 and earlier produce predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections. | 7.5 |
2001-02-28 | CVE-2001-1434 | Unspecified vulnerability in Cisco IOS Cisco IOS 12.0(5)XU through 12.1(2) allows remote attackers to read system administration and topology information via an "snmp-server host" command, which creates a readable "community" community string if one has not been previously created. | 5.0 |
2000-04-26 | CVE-2000-0380 | Improper Input Validation vulnerability in Cisco IOS The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string. | 7.1 |
2000-04-20 | CVE-2000-0268 | Unspecified vulnerability in Cisco products Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot. | 5.0 |
1999-04-01 | CVE-1999-0445 | Unspecified vulnerability in Cisco IOS In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters. | 5.0 |