Page 3 of 14 results (0.002 seconds)

CVSS: 5.0EPSS: 0%CPEs: 9EXPL: 0

Cisco Virtual Private Network (VPN) Client software 2.x.x, and 3.x before 3.6(Rel), when configured with all tunnel mode, can be forced into acknowledging a TCP packet from outside the tunnel. • http://www.cisco.com/warp/public/707/vpnclient-multiple2-vuln-pub.shtml http://www.securityfocus.com/bid/5651 https://exchange.xforce.ibmcloud.com/vulnerabilities/10047 •

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 0

Cisco Virtual Private Network (VPN) Client 3.5.4 and earlier allows remote attackers to cause a denial of service (CPU consumption) via a packet with a zero-length payload. El Cliente de Red Privada Virtual (VPN) de Cisco 3.5.4 y anteriores permite a atacantes remotos causar una denegación de servicio (consumición de CPU) mediante un paquete con una carga útil de longitud cero. • http://www.cisco.com/warp/public/707/vpnclient-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/9821.php http://www.kb.cert.org/vuls/id/287771 http://www.securityfocus.com/bid/5440 •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Buffer overflows in Cisco Virtual Private Network (VPN) Client 3.5.4 and earlier allows remote attackers to cause a denial of service via (1) an Internet Key Exchange (IKE) with a large Security Parameter Index (SPI) payload, or (2) an IKE packet with a large number of valid payloads. Desbordamiento de búfer en Cliente de Red Privada Virtual (VPN) de Cisco 3.5.4 y anteriores permite a atacantes remotos causar una denegación de servicio mediante un Intecambio de Clave de Intenet (Internet Key Exchange - IKE) con un contenido útil (payload) de una Índice de Parámetro de Seguridad (Security Parameter Index - SQI) largo, o un paquete IKE con un número grande de contenidos útiles válidos. • http://www.cisco.com/warp/public/707/vpnclient-multiple-vuln-pub.shtml •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

Buffer overflow in the vpnclient program for UNIX VPN Client before 3.5.2 allows local users to gain administrative privileges via a long profile name in a connect argument. • https://www.exploit-db.com/exploits/21568 http://online.securityfocus.com/archive/1/277653 http://sec.angrypacket.com/advisories/0002_AP.vpnclient.txt http://www.cisco.com/warp/public/707/cisco-unix-vpnclient-buffer-overflow-pub.shtml http://www.iss.net/security_center/static/9376.php http://www.securityfocus.com/bid/5056 •