Page 2 of 19 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 45EXPL: 0

Cisco VPN 3000 series Concentrator running firmware 4.1.7.A and earlier allows remote attackers to cause a denial of service (device reload or drop user connection) via a crafted HTTPS packet. • http://secunia.com/advisories/14784 http://www.cisco.com/warp/public/707/cisco-sa-20050330-vpn3k.shtml http://www.securityfocus.com/bid/12948 https://exchange.xforce.ibmcloud.com/vulnerabilities/19903 •

CVSS: 5.0EPSS: 0%CPEs: 31EXPL: 0

Cisco VPN 3000 series concentrators and Cisco VPN 3002 Hardware Client 2.x.x through 3.6.7A allow remote attackers to cause a denial of service (slowdown and possibly reload) via a flood of malformed ICMP packets. Concentradores de Cisco de la serie VPN 3000 y Cisco VPN 3002 Hardware Client 2.x.x hasta 3.6.7A permiten que atacantes remotos causen una denegación de servicio (ralentización y posiblemente recarga) mediante una inundación con paquetes ICMP mal construídos. • http://www.cisco.com/warp/public/707/cisco-sa-20030507-vpn3k.shtml http://www.kb.cert.org/vuls/id/221164 https://exchange.xforce.ibmcloud.com/vulnerabilities/11956 •

CVSS: 5.0EPSS: 0%CPEs: 36EXPL: 0

Cisco VPN 3000 series concentrators and Cisco VPN 3002 Hardware Client 2.x.x through 3.6.7 allows remote attackers to cause a denial of service (reload) via a malformed SSH initialization packet. Concentradores de Cisco de la serie VPN 3000 y Cisco VPN 3002 Hardware Client 2.x.x hasta 3.6.7 permiten que atacantes remotos causen una denegación de servicio (recarga) mediante un paquete de inicialización SSH mal construído. • http://www.cisco.com/warp/public/707/cisco-sa-20030507-vpn3k.shtml http://www.kb.cert.org/vuls/id/317348 https://exchange.xforce.ibmcloud.com/vulnerabilities/11955 •

CVSS: 5.0EPSS: 0%CPEs: 20EXPL: 0

Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.3, allows remote attackers to obtain potentially sensitive information without authentication by directly accessing certain HTML pages. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10024.php http://www.securityfocus.com/bid/5616 •

CVSS: 7.5EPSS: 0%CPEs: 20EXPL: 0

Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.3, adds an "HTTPS on Public Inbound (XML-Auto)(forward/in)" rule but sets the protocol to "ANY" when the XML filter configuration is enabled, which ultimately allows arbitrary traffic to pass through the concentrator. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10023.php http://www.securityfocus.com/bid/5614 •