mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
Update CVE sources 2024-07-25 21:25
This commit is contained in:
17
2000/CVE-2000-0267.md
Normal file
17
2000/CVE-2000-0267.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2000-0267](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0267)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Cisco Catalyst 5.4.x allows a user to gain access to the "enable" mode without a password.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2000/CVE-2000-0268.md
Normal file
17
2000/CVE-2000-0268.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2000-0268](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0268)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2000/CVE-2000-0368.md
Normal file
17
2000/CVE-2000-0368.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2000-0368](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0368)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Classic Cisco IOS 9.1 and later allows attackers with access to the login prompt to obtain portions of the command history of previous users, which may allow the attacker to access sensitive data.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.cisco.com/warp/public/770/ioshist-pub.shtml
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2000/CVE-2000-0380.md
Normal file
17
2000/CVE-2000-0380.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2000-0380](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0380)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.cisco.com/warp/public/707/ioshttpserver-pub.shtml
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
@@ -15,4 +15,5 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/joscanoga/Reto-python-CRM
|
||||
- https://github.com/riik-db/cc_hw
|
||||
|
||||
|
||||
17
2000/CVE-2000-0700.md
Normal file
17
2000/CVE-2000-0700.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2000-0700](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0700)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Cisco Gigabit Switch Routers (GSR) with Fast Ethernet / Gigabit Ethernet cards, from IOS versions 11.2(15)GS1A up to 11.2(19)GS0.2 and some versions of 12.0, do not properly handle line card failures, which allows remote attackers to bypass ACLs or force the interface to stop forwarding packets.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.cisco.com/warp/public/707/gsraclbypassdos-pub.shtml
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
@@ -10,7 +10,7 @@ The HTTP server in Cisco IOS 12.0 through 12.1 allows local users to cause a den
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- http://www.cisco.com/warp/public/707/ioshttpserverquery-pub.shtml
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
|
||||
17
2000/CVE-2000-1022.md
Normal file
17
2000/CVE-2000-1022.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2000-1022](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1022)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The mailguard feature in Cisco Secure PIX Firewall 5.2(2) and earlier does not properly restrict access to SMTP commands, which allows remote attackers to execute restricted commands by sending a DATA command before sending the restricted commands.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.cisco.com/warp/public/707/PIXfirewallSMTPfilter-pub.shtml
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2000/CVE-2000-1054.md
Normal file
17
2000/CVE-2000-1054.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2000-1054](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1054)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Buffer overflow in CSAdmin module in CiscoSecure ACS Server 2.4(2) and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a large packet.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.cisco.com/warp/public/707/csecureacsnt-pub.shtml
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2000/CVE-2000-1055.md
Normal file
17
2000/CVE-2000-1055.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2000-1055](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1055)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Buffer overflow in CiscoSecure ACS Server 2.4(2) and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a large TACACS+ packet.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.cisco.com/warp/public/707/csecureacsnt-pub.shtml
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2000/CVE-2000-1056.md
Normal file
17
2000/CVE-2000-1056.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2000-1056](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1056)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
CiscoSecure ACS Server 2.4(2) and earlier allows remote attackers to bypass LDAP authentication on the server if the LDAP server allows null passwords.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.cisco.com/warp/public/707/csecureacsnt-pub.shtml
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
Reference in New Issue
Block a user