Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco secure access control system 5.8 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2018-0253
A vulnerability in the ACS Report component of Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote malicious user to execute arbitrary commands on an affected system. Commands executed by the attacker are processed at the targeted user's privilege...
Cisco Secure Access Control System 5.8\\(0.8\\)
Cisco Secure Access Control System 5.8
Cisco Secure Access Control System
1 Article
10
CVSSv2
CVE-2018-0147
A vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) prior to release 5.8 patch 9 could allow an unauthenticated, remote malicious user to execute arbitrary commands on an affected device. The vulnerability is due to insecure deserialization of...
Cisco Secure Access Control System 5.2\\(0.3\\)
1 Article
10
CVSSv2
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.2
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.3.1
Hp Hp-ux 10.01
Hp Hp-ux 10.10
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sco Openserver 5.0.5
Sco Openserver 5.0.6
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.7
Sun Solaris 7.0
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Sco Openserver 5.0
Sco Openserver 5.0.1
Sun Sunos 5.1
Sun Sunos 5.2
Sun Solaris 2.5.1
8 EDB exploits
2 Github repositories
5.8
CVSSv2
CVE-2017-3840
A vulnerability in the web interface of the Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote malicious user to redirect a user to a malicious web page, aka an Open Redirect Vulnerability. More Information: CSCvc04849. Known Affected Releases: 5.8(2....
Cisco Secure Access Control System 5.8\\(2.5\\)
5.8
CVSSv2
CVE-2015-7973
NTP prior to 4.2.8p6 and 4.3.x prior to 4.3.90, when configured in broadcast mode, allows man-in-the-middle malicious users to conduct replay attacks by sniffing the network.
Ntp Ntp
Ntp Ntp 4.2.8
Siemens Tim 4r-ie Firmware
Siemens Tim 4r-ie Dnp3 Firmware
Freebsd Freebsd 9.3
Freebsd Freebsd
Freebsd Freebsd 10.1
Freebsd Freebsd 10.2
Netapp Clustered Data Ontap -
Netapp Oncommand Balance -
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
5.8
CVSSv2
CVE-2015-8140
The ntpq protocol in NTP prior to 4.2.8p7 allows remote malicious users to conduct replay attacks by sniffing the network.
Ntp Ntp
5
CVSSv2
CVE-2017-12354
A vulnerability in the web-based interface of Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote malicious user to view sensitive information on an affected system. The vulnerability exists because the affected software does not sufficiently protect s...
Cisco Secure Access Control System 5.8\\(0.32\\)
5
CVSSv2
CVE-2017-3841
A vulnerability in the web interface of the Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote malicious user to disclose sensitive information. More Information: CSCvc04854. Known Affected Releases: 5.8(2.5).
Cisco Secure Access Control System 5.8\\(2.5\\)
5
CVSSv2
CVE-2015-8139
ntpq in NTP prior to 4.2.8p7 allows remote malicious users to obtain origin timestamps and then impersonate peers via unspecified vectors.
Ntp Ntp
4.3
CVSSv2
CVE-2018-0207
A vulnerability in the web-based user interface of the Cisco Secure Access Control Server before 5.8 patch 9 could allow an unauthenticated, remote malicious user to gain read access to certain information in the affected system. The vulnerability is due to improper handling of X...
Cisco Secure Access Control Server Solution Engine 5.8\\(0.8\\)
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »