Vulnerabilities > Cisco > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-07-01 | CVE-1999-0889 | Remote Security vulnerability in Cisco 675 Router Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or superuser password has not been set. | 7.5 |
1999-03-11 | CVE-1999-0415 | Unspecified vulnerability in Cisco 7XX Routers 3.2 The HTTP server in Cisco 7xx series routers 3.2 through 4.2 is enabled by default, which allows remote attackers to change the router's configuration. | 7.5 |
1998-07-15 | CVE-1999-1582 | Unspecified vulnerability in Cisco PIX Firewall By design, the "established" command on the Cisco PIX firewall allows connections from one host to arbitrary ports of a target host if an alternative conduit has already been allowed, which can cause administrators to configure less restrictive access controls than intended if they do not understand this functionality. | 7.5 |
1997-10-01 | CVE-1999-0160 | Unspecified vulnerability in Cisco IOS Some classic Cisco IOS devices have a vulnerability in the PPP CHAP authentication to establish unauthorized PPP connections. | 7.5 |
1995-07-31 | CVE-1999-0161 | Unspecified vulnerability in Cisco IOS 10.3(3.4)/10.3(4.2) In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering. | 7.5 |
1993-04-22 | CVE-1999-1216 | Unspecified vulnerability in Cisco Router Cisco routers 9.17 and earlier allow remote attackers to bypass security restrictions via certain IP source routed packets that should normally be denied using the "no ip source-route" command. | 7.5 |
1992-12-10 | CVE-1999-1466 | Unspecified vulnerability in Cisco IOS Vulnerability in Cisco routers versions 8.2 through 9.1 allows remote attackers to bypass access control lists when extended IP access lists are used on certain interfaces, the IP route cache is enabled, and the access list uses the "established" keyword. | 7.5 |
1992-12-10 | CVE-1999-1306 | Unspecified vulnerability in Cisco IOS Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the "established" keyword is set, which could allow attackers to bypass filters. | 7.5 |