Page 3 of 22 results (0.002 seconds)

CVSS: 5.0EPSS: 0%CPEs: 31EXPL: 0

Cisco VPN 3000 series concentrators and Cisco VPN 3002 Hardware Client 2.x.x through 3.6.7A allow remote attackers to cause a denial of service (slowdown and possibly reload) via a flood of malformed ICMP packets. Concentradores de Cisco de la serie VPN 3000 y Cisco VPN 3002 Hardware Client 2.x.x hasta 3.6.7A permiten que atacantes remotos causen una denegación de servicio (ralentización y posiblemente recarga) mediante una inundación con paquetes ICMP mal construídos. • http://www.cisco.com/warp/public/707/cisco-sa-20030507-vpn3k.shtml http://www.kb.cert.org/vuls/id/221164 https://exchange.xforce.ibmcloud.com/vulnerabilities/11956 •

CVSS: 7.5EPSS: 0%CPEs: 23EXPL: 0

Cisco VPN 3000 series concentrators and Cisco VPN 3002 Hardware Client 3.5.x through 4.0.REL, when enabling IPSec over TCP for a port on the concentrator, allow remote attackers to reach the private network without authentication. Concentradores de Cisco de la serie VPN 3000 y Cisco VPN 3002 Hardware Client 2.x.x hasta 4.0.REL, cuando se configuran para permitir IPSec sobre TCP para un puerto del concentrador, permiten que atacantes remotos alcancen la red privada sin autentificación. • http://www.cisco.com/warp/public/707/cisco-sa-20030507-vpn3k.shtml http://www.kb.cert.org/vuls/id/727780 https://exchange.xforce.ibmcloud.com/vulnerabilities/11954 •

CVSS: 7.5EPSS: 0%CPEs: 20EXPL: 0

Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.3, adds an "HTTPS on Public Inbound (XML-Auto)(forward/in)" rule but sets the protocol to "ANY" when the XML filter configuration is enabled, which ultimately allows arbitrary traffic to pass through the concentrator. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10023.php http://www.securityfocus.com/bid/5614 •

CVSS: 5.0EPSS: 0%CPEs: 21EXPL: 0

The LAN-to-LAN IPSEC capability for Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.4, allows remote attackers to cause a denial of service via an incoming LAN-to-LAN connection with an existing security association with another device on the remote network, which causes the concentrator to remove the previous connection. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.securityfocus.com/bid/5622 https://exchange.xforce.ibmcloud.com/vulnerabilities/10027 •

CVSS: 7.5EPSS: 0%CPEs: 13EXPL: 0

Cisco Virtual Private Network (VPN) Client software 2.x.x, and 3.x before 3.5.2B, does not generate sufficiently random numbers, which may make it vulnerable to certain attacks such as spoofing. • http://www.cisco.com/warp/public/707/vpnclient-multiple2-vuln-pub.shtml http://www.securityfocus.com/bid/5653 https://exchange.xforce.ibmcloud.com/vulnerabilities/10046 •