CVE-2002-1105
https://notcve.org/view.php?id=CVE-2002-1105
Cisco Virtual Private Network (VPN) Client software 2.x.x, and 3.x before 3.5.1C, allows local users to use a utility program to obtain the group password. • http://www.cisco.com/warp/public/707/vpnclient-multiple2-vuln-pub.shtml http://www.securityfocus.com/bid/5650 https://exchange.xforce.ibmcloud.com/vulnerabilities/10044 •
CVE-2002-1098
https://notcve.org/view.php?id=CVE-2002-1098
Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.3, adds an "HTTPS on Public Inbound (XML-Auto)(forward/in)" rule but sets the protocol to "ANY" when the XML filter configuration is enabled, which ultimately allows arbitrary traffic to pass through the concentrator. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10023.php http://www.securityfocus.com/bid/5614 •
CVE-2002-1108
https://notcve.org/view.php?id=CVE-2002-1108
Cisco Virtual Private Network (VPN) Client software 2.x.x, and 3.x before 3.6(Rel), when configured with all tunnel mode, can be forced into acknowledging a TCP packet from outside the tunnel. • http://www.cisco.com/warp/public/707/vpnclient-multiple2-vuln-pub.shtml http://www.securityfocus.com/bid/5651 https://exchange.xforce.ibmcloud.com/vulnerabilities/10047 •
CVE-2002-1102
https://notcve.org/view.php?id=CVE-2002-1102
The LAN-to-LAN IPSEC capability for Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.4, allows remote attackers to cause a denial of service via an incoming LAN-to-LAN connection with an existing security association with another device on the remote network, which causes the concentrator to remove the previous connection. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.securityfocus.com/bid/5622 https://exchange.xforce.ibmcloud.com/vulnerabilities/10027 •
CVE-2002-1100
https://notcve.org/view.php?id=CVE-2002-1100
Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.3, allows remote attackers to cause a denial of service (crash) via a long (1) username or (2) password to the HTML login interface. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10025.php http://www.securityfocus.com/bid/5617 •