Page 4 of 18 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 13EXPL: 0

Cisco Virtual Private Network (VPN) Client software 2.x.x, and 3.x before 3.5.2B, does not generate sufficiently random numbers, which may make it vulnerable to certain attacks such as spoofing. • http://www.cisco.com/warp/public/707/vpnclient-multiple2-vuln-pub.shtml http://www.securityfocus.com/bid/5653 https://exchange.xforce.ibmcloud.com/vulnerabilities/10046 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

Cisco Virtual Private Network (VPN) Client software 2.x.x, and 3.x before 3.5.1C, allows local users to use a utility program to obtain the group password. • http://www.cisco.com/warp/public/707/vpnclient-multiple2-vuln-pub.shtml http://www.securityfocus.com/bid/5650 https://exchange.xforce.ibmcloud.com/vulnerabilities/10044 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

Buffer overflow in the vpnclient program for UNIX VPN Client before 3.5.2 allows local users to gain administrative privileges via a long profile name in a connect argument. • https://www.exploit-db.com/exploits/21568 http://online.securityfocus.com/archive/1/277653 http://sec.angrypacket.com/advisories/0002_AP.vpnclient.txt http://www.cisco.com/warp/public/707/cisco-unix-vpnclient-buffer-overflow-pub.shtml http://www.iss.net/security_center/static/9376.php http://www.securityfocus.com/bid/5056 •