Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco vpn 3020 concentrator vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-4354
The remote-access IPSec VPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices, PIX Security Appliances 500 series devices, and VPN Concentrators 3000 series devices responds to an Aggressive Mode IKE Phase I message only when the group name is configu...
Cisco Asa 5500
Cisco Pix 500
Cisco Vpn 3015 Concentrator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3000 Concentrator
Cisco Vpn 3005 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3080 Concentrator
NA
CVE-2006-3906
Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote malicious users to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOT...
Cisco Ios
Cisco Vpn 3001 Concentrator
Cisco Vpn 3015 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3080 Concentrator
Cisco Adaptive Security Appliance Software 7.0
Cisco Adaptive Security Appliance Software 7.0(4)
Cisco Adaptive Security Appliance Software 7.0(5)
Cisco Adaptive Security Appliance Software 7.0.1.4
Cisco Adaptive Security Appliance Software 7.0.4.3
Cisco Adaptive Security Appliance Software 7.1(2)
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
NA
CVE-2005-4499
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote malicious u...
Cisco Vpn 3001 Concentrator
Cisco Vpn 3015 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3080 Concentrator
Cisco Adaptive Security Appliance Software 7.0
Cisco Adaptive Security Appliance Software 7.0(4)
Cisco Adaptive Security Appliance Software 7.0.1.4
Cisco Adaptive Security Appliance Software 7.0.4.3
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
Cisco Vpn 3000 Concentrator Series Software 3.0.4
Cisco Vpn 3000 Concentrator Series Software 3.1
Cisco Vpn 3000 Concentrator Series Software 3.1(rel)
NA
CVE-2005-2025
Cisco VPN 3000 Concentrator prior to 4.1.7.F allows remote malicious users to determine valid groupnames by sending an IKE Aggressive Mode packet with the groupname in the ID field, which generates a response if the groupname is valid, but does not generate a response for an inva...
Cisco Vpn 3015 Concentrator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3000 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3080 Concentrator
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.6.7.a
Cisco Vpn 3000 Concentrator Series Software 3.6.7.b
Cisco Vpn 3000 Concentrator Series Software 3.6.7.c
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.5.2
Cisco Vpn 3000 Concentrator Series Software 3.5.3
Cisco Vpn 3000 Concentrator Series Software 3.5.4
Cisco Vpn 3000 Concentrator Series Software 3.5.5
Cisco Vpn 3000 Concentrator Series Software 4.1.5.b
Cisco Vpn 3000 Concentrator Series Software 4.1.7.a
Cisco Vpn 3000 Concentrator Series Software 4.1.7.b
Cisco Vpn 3000 Concentrator Series Software 4.1
NA
CVE-2005-0943
Cisco VPN 3000 series Concentrator running firmware 4.1.7.A and previous versions allows remote malicious users to cause a denial of service (device reload or drop user connection) via a crafted HTTPS packet.
Cisco Vpn 3015 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3080 Concentrator
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
Cisco Vpn 3000 Concentrator Series Software 3.0.4
Cisco Vpn 3000 Concentrator Series Software 3.1
Cisco Vpn 3000 Concentrator Series Software 3.1(rel)
Cisco Vpn 3000 Concentrator Series Software 3.1.1
Cisco Vpn 3000 Concentrator Series Software 3.1.2
Cisco Vpn 3000 Concentrator Series Software 3.1.4
Cisco Vpn 3000 Concentrator Series Software 3.5(rel)
Cisco Vpn 3000 Concentrator Series Software 3.5.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started