Vulnerabilities > Cisco
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-03-11 | CVE-1999-0415 | Unspecified vulnerability in Cisco 7XX Routers 3.2 The HTTP server in Cisco 7xx series routers 3.2 through 4.2 is enabled by default, which allows remote attackers to change the router's configuration. | 7.5 |
1999-03-01 | CVE-1999-0430 | Unspecified vulnerability in Cisco products Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload. | 5.0 |
1999-03-01 | CVE-1999-0222 | Unspecified vulnerability in Cisco Router Denial of service in Cisco IOS web server allows attackers to reboot the router using a long URL. | 5.0 |
1999-01-11 | CVE-1999-0063 | Unspecified vulnerability in Cisco IOS Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port. | 5.0 |
1999-01-01 | CVE-1999-0453 | Information Exposure vulnerability in Cisco Router An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP). | 5.0 |
1998-09-01 | CVE-1999-0162 | Unspecified vulnerability in Cisco IOS 11.2 The "established" keyword in some Cisco IOS software allowed an attacker to bypass filtering. | 5.0 |
1998-08-31 | CVE-1999-0158 | Unspecified vulnerability in Cisco PIX Firewall Software 4.1(6)/4.2(1) Cisco PIX firewall manager (PFM) on Windows NT allows attackers to connect to port 8080 on the PFM server and retrieve any file whose name and location is known. | 5.0 |
1998-08-18 | CVE-1999-0157 | Unspecified vulnerability in Cisco IOS and PIX Firewall Software Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service. | 5.0 |
1998-08-12 | CVE-1999-0159 | Unspecified vulnerability in Cisco IOS Attackers can crash a Cisco IOS router or device, provided they can get to an interactive prompt (such as a login). | 5.0 |
1998-07-15 | CVE-1999-1582 | Unspecified vulnerability in Cisco PIX Firewall By design, the "established" command on the Cisco PIX firewall allows connections from one host to arbitrary ports of a target host if an alternative conduit has already been allowed, which can cause administrators to configure less restrictive access controls than intended if they do not understand this functionality. | 7.5 |