Page 4 of 21 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 13EXPL: 0

Cisco Virtual Private Network (VPN) Client software 2.x.x, and 3.x before 3.5.2B, does not generate sufficiently random numbers, which may make it vulnerable to certain attacks such as spoofing. • http://www.cisco.com/warp/public/707/vpnclient-multiple2-vuln-pub.shtml http://www.securityfocus.com/bid/5653 https://exchange.xforce.ibmcloud.com/vulnerabilities/10046 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

Cisco Virtual Private Network (VPN) Client software 2.x.x, and 3.x before 3.5.1C, allows local users to use a utility program to obtain the group password. • http://www.cisco.com/warp/public/707/vpnclient-multiple2-vuln-pub.shtml http://www.securityfocus.com/bid/5650 https://exchange.xforce.ibmcloud.com/vulnerabilities/10044 •

CVSS: 5.0EPSS: 0%CPEs: 9EXPL: 0

Cisco Virtual Private Network (VPN) Client software 2.x.x, and 3.x before 3.6(Rel), when configured with all tunnel mode, can be forced into acknowledging a TCP packet from outside the tunnel. • http://www.cisco.com/warp/public/707/vpnclient-multiple2-vuln-pub.shtml http://www.securityfocus.com/bid/5651 https://exchange.xforce.ibmcloud.com/vulnerabilities/10047 •

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 0

Cisco Virtual Private Network (VPN) Client 3.5.4 and earlier allows remote attackers to cause a denial of service (CPU consumption) via a packet with a zero-length payload. El Cliente de Red Privada Virtual (VPN) de Cisco 3.5.4 y anteriores permite a atacantes remotos causar una denegación de servicio (consumición de CPU) mediante un paquete con una carga útil de longitud cero. • http://www.cisco.com/warp/public/707/vpnclient-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/9821.php http://www.kb.cert.org/vuls/id/287771 http://www.securityfocus.com/bid/5440 •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Buffer overflows in Cisco Virtual Private Network (VPN) Client 3.5.4 and earlier allows remote attackers to cause a denial of service via (1) an Internet Key Exchange (IKE) with a large Security Parameter Index (SPI) payload, or (2) an IKE packet with a large number of valid payloads. Desbordamiento de búfer en Cliente de Red Privada Virtual (VPN) de Cisco 3.5.4 y anteriores permite a atacantes remotos causar una denegación de servicio mediante un Intecambio de Clave de Intenet (Internet Key Exchange - IKE) con un contenido útil (payload) de una Índice de Parámetro de Seguridad (Security Parameter Index - SQI) largo, o un paquete IKE con un número grande de contenidos útiles válidos. • http://www.cisco.com/warp/public/707/vpnclient-multiple-vuln-pub.shtml •