Vulnerabilities > Cisco > IOS > 3.6.4e

DATE CVE VULNERABILITY TITLE RISK
2004-12-31 CVE-2004-1464 Remote Denial of Service vulnerability in Cisco IOS Telnet Service
Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port.
network
low complexity
cisco
5.0
2003-08-27 CVE-2003-0647 Remote Security vulnerability in IOS
Buffer overflow in the HTTP server for Cisco IOS 12.2 and earlier allows remote attackers to execute arbitrary code via an extremely long (2GB) HTTP GET request.
network
low complexity
cisco
7.5
2001-05-03 CVE-2001-0288 Unspecified vulnerability in Cisco IOS
Cisco switches and routers running IOS 12.1 and earlier produce predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections.
network
low complexity
cisco
7.5
2001-03-12 CVE-2000-0368 Information Exposure vulnerability in Cisco IOS
Classic Cisco IOS 9.1 and later allows attackers with access to the login prompt to obtain portions of the command history of previous users, which may allow the attacker to access sensitive data.
local
low complexity
cisco CWE-200
2.1
1999-12-31 CVE-1999-1465 Unspecified vulnerability in Cisco IOS
Vulnerability in Cisco IOS 11.1 through 11.3 with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled input interface to an output interface with a logical subinterface, as described by Cisco bug CSCdk43862.
network
low complexity
cisco
7.5
1999-12-31 CVE-1999-1175 Unspecified vulnerability in Cisco IOS
Web Cache Control Protocol (WCCP) in Cisco Cache Engine for Cisco IOS 11.2 and earlier does not use authentication, which allows remote attackers to redirect HTTP traffic to arbitrary hosts via WCCP packets to UDP port 2048.
network
low complexity
cisco
7.5
1992-12-10 CVE-1999-1306 Unspecified vulnerability in Cisco IOS
Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the "established" keyword is set, which could allow attackers to bypass filters.
network
low complexity
cisco
7.5