Page 4 of 24 results (0.001 seconds)

CVSS: 7.5EPSS: 0%CPEs: 17EXPL: 0

Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.2, allows restricted administrators to obtain certificate passwords that are stored in plaintext in the HTML source code for Certificate Management pages. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10022.php http://www.securityfocus.com/bid/5612 •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

Cisco VPN 3000 Concentrator before 2.5.2(F), with encryption enabled, allows remote attackers to cause a denial of service (reload) via a Windows-based PPTP client with the "No Encryption" option set. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10021.php http://www.securityfocus.com/bid/5625 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Cisco VPN 3000 Concentrator 3.6(Rel) and earlier, and 2.x.x, when configured to use internal authentication with group accounts and without any user accounts, allows remote VPN clients to log in using PPTP or IPSEC user authentication. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.securityfocus.com/bid/5613 https://exchange.xforce.ibmcloud.com/vulnerabilities/10017 •

CVSS: 5.0EPSS: 0%CPEs: 20EXPL: 0

Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.3, allows remote attackers to obtain potentially sensitive information without authentication by directly accessing certain HTML pages. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10024.php http://www.securityfocus.com/bid/5616 •

CVSS: 5.0EPSS: 0%CPEs: 20EXPL: 0

Information leaks in Cisco VPN 3000 Concentrator 2.x.x and 3.x.x before 3.5.4 allow remote attackers to obtain potentially sensitive information via the (1) SSH banner, (2) FTP banner, or (3) an incorrect HTTP request. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10020.php http://www.securityfocus.com/bid/5621 http://www.securityfocus.com/bid/5623 http://www.securityfocus.com/bid/5624 •