Page 3 of 17 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 20EXPL: 0

Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.3, adds an "HTTPS on Public Inbound (XML-Auto)(forward/in)" rule but sets the protocol to "ANY" when the XML filter configuration is enabled, which ultimately allows arbitrary traffic to pass through the concentrator. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10023.php http://www.securityfocus.com/bid/5614 •

CVSS: 5.0EPSS: 0%CPEs: 21EXPL: 0

The LAN-to-LAN IPSEC capability for Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.4, allows remote attackers to cause a denial of service via an incoming LAN-to-LAN connection with an existing security association with another device on the remote network, which causes the concentrator to remove the previous connection. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.securityfocus.com/bid/5622 https://exchange.xforce.ibmcloud.com/vulnerabilities/10027 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Cisco VPN 3000 Concentrator 3.6(Rel) and earlier, and 2.x.x, when configured to use internal authentication with group accounts and without any user accounts, allows remote VPN clients to log in using PPTP or IPSEC user authentication. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.securityfocus.com/bid/5613 https://exchange.xforce.ibmcloud.com/vulnerabilities/10017 •

CVSS: 5.0EPSS: 0%CPEs: 20EXPL: 0

Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.3, allows remote attackers to cause a denial of service (crash) via a long (1) username or (2) password to the HTML login interface. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10025.php http://www.securityfocus.com/bid/5617 •

CVSS: 5.0EPSS: 0%CPEs: 20EXPL: 0

Information leaks in Cisco VPN 3000 Concentrator 2.x.x and 3.x.x before 3.5.4 allow remote attackers to obtain potentially sensitive information via the (1) SSH banner, (2) FTP banner, or (3) an incorrect HTTP request. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10020.php http://www.securityfocus.com/bid/5621 http://www.securityfocus.com/bid/5623 http://www.securityfocus.com/bid/5624 •