Page 3 of 16 results (0.016 seconds)

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

Cisco Secure Access Control Server (ACS) 3.2(3) and earlier spawns a separate unauthenticated TCP connection on a random port when a user authenticates to the ACS GUI, which allows remote attackers to bypass authentication by connecting to that port from the same IP address. • http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml http://www.securityfocus.com/bid/11047 https://exchange.xforce.ibmcloud.com/vulnerabilities/17118 •

CVSS: 7.5EPSS: 2%CPEs: 12EXPL: 0

Buffer overflow in the administration service (CSAdmin) for Cisco Secure ACS before 3.1.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long user parameter to port 2002. Desbordamiento de búfer en el servicio de administración (CSAdmin) de Cisco Secure ACS anteriores a 3.1.2 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante un parámetro de usuario largo al puerto 2002. • http://marc.info/?l=bugtraq&m=105120066126196&w=2 http://marc.info/?l=ntbugtraq&m=105118056332344&w=2 http://www.cisco.com/warp/public/707/cisco-sa-20030423-ACS.shtml http://www.kb.cert.org/vuls/id/697049 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 2

Cross-site scripting vulnerability in CiscoSecure ACS 3.0 allows remote attackers to execute arbitrary script or HTML as other web users via the action argument in a link to setup.exe. • https://www.exploit-db.com/exploits/21555 http://archives.neohapsis.com/archives/bugtraq/2002-06/0156.html http://online.securityfocus.com/archive/1/278222 http://www.iss.net/security_center/static/9353.php http://www.securityfocus.com/bid/5026 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

NDSAuth.DLL in Cisco Secure Authentication Control Server (ACS) 3.0.1 does not check the Expired or Disabled state of users in the Novell Directory Services (NDS), which could allow those users to authenticate to the server. NDSAuth.DLL en Cisco Secure Authentication Control Server (ACS) 3.0.1 no comprueba el estado "caducado" o "deshabilitado" de los usuarios en el directorio de servicios Novell, lo cual permitiría a otros usuarios autentificarse en el servidor. • http://www.cisco.com/warp/public/707/ciscosecure-acs-nds-authentication-vuln-pub.shtml http://www.iss.net/security_center/static/8106.php http://www.securityfocus.com/bid/4048 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

The administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to read HTML, Java class, and image files outside the web root via a ..\.. (modified ..) in the URL to port 2002. La función de administración en Cisco Secure Access Control Control Server (ACS) para Windows, 2.6.x y anteriores, y 3.x a 3.01 (build 40), permite a atacantes remotos leer HTML, clases de Java y ficheros de imágenes fuera de la raíz del web mediante un .... (ataque punto punto modificado) en la URL al puerto 2002. • http://marc.info/?l=bugtraq&m=101786689128667&w=2 http://www.cisco.com/warp/public/707/ACS-Win-Web.shtml http://www.osvdb.org/5352 •