Page 2 of 17 results (0.002 seconds)

CVSS: 7.5EPSS: 1%CPEs: 10EXPL: 0

31 Dec 2004 — Cisco Secure Access Control Server (ACS) 3.2, when configured as a Light Extensible Authentication Protocol (LEAP) RADIUS proxy, allows remote attackers to cause a denial of service (device crash) via certain LEAP authentication requests. • http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml •

CVSS: 9.8EPSS: 0%CPEs: 10EXPL: 0

31 Dec 2004 — Cisco Secure Access Control Server (ACS) 3.2(3) and earlier, when configured with an anonymous bind in Novell Directory Services (NDS) and authenticating NDS users with NDS, allows remote attackers to gain unauthorized access to AAA clients via a blank password. • http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml •

CVSS: 9.1EPSS: 0%CPEs: 10EXPL: 0

31 Dec 2004 — Cisco Secure Access Control Server (ACS) 3.2(3) and earlier spawns a separate unauthenticated TCP connection on a random port when a user authenticates to the ACS GUI, which allows remote attackers to bypass authentication by connecting to that port from the same IP address. • http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml •

CVSS: 9.8EPSS: 2%CPEs: 12EXPL: 0

26 Apr 2003 — Buffer overflow in the administration service (CSAdmin) for Cisco Secure ACS before 3.1.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long user parameter to port 2002. Desbordamiento de búfer en el servicio de administración (CSAdmin) de Cisco Secure ACS anteriores a 3.1.2 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante un parámetro de usuario largo al puerto 2002. • http://marc.info/?l=bugtraq&m=105120066126196&w=2 •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 2

04 Oct 2002 — Cross-site scripting vulnerability in CiscoSecure ACS 3.0 allows remote attackers to execute arbitrary script or HTML as other web users via the action argument in a link to setup.exe. • https://www.exploit-db.com/exploits/21555 •

CVSS: 9.8EPSS: 2%CPEs: 6EXPL: 0

22 Apr 2002 — Format string vulnerability in the administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to crash the CSADMIN module only (denial of service of administration function) or execute arbitrary code via format strings in the URL to port 2002. Vulnerabilidad de formato de cadena en la función de administración de Cisco Secure Access Control Server (ACS) para Windows, 2.6.x y anteriores y 3.x a 3.01 (build 40), p... • http://marc.info/?l=bugtraq&m=101787248913611&w=2 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

22 Apr 2002 — The administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to read HTML, Java class, and image files outside the web root via a ..\.. (modified ..) in the URL to port 2002. La función de administración en Cisco Secure Access Control Control Server (ACS) para Windows, 2.6.x y anteriores, y 3.x a 3.01 (build 40), permite a atacantes remotos leer HTML, clases de Java y ficheros de imágenes fuera de la raíz del ... • http://marc.info/?l=bugtraq&m=101786689128667&w=2 •