Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco vpn 3060 concentrator vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0427
Cisco VPN 3000 series concentrators prior to 2.5.2(F) allow remote malicious users to cause a denial of service via a flood of invalid login requests to (1) the SSL service, or (2) the telnet service, which do not properly disconnect the user after several failed login attempts.
Cisco Vpn 3015 Concentrator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3000 Concentrator
Cisco Vpn 3005 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3080 Concentrator
NA
CVE-2010-4354
The remote-access IPSec VPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices, PIX Security Appliances 500 series devices, and VPN Concentrators 3000 series devices responds to an Aggressive Mode IKE Phase I message only when the group name is configu...
Cisco Asa 5500
Cisco Pix 500
Cisco Vpn 3015 Concentrator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3000 Concentrator
Cisco Vpn 3005 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3080 Concentrator
NA
CVE-2005-2025
Cisco VPN 3000 Concentrator prior to 4.1.7.F allows remote malicious users to determine valid groupnames by sending an IKE Aggressive Mode packet with the groupname in the ID field, which generates a response if the groupname is valid, but does not generate a response for an inva...
Cisco Vpn 3015 Concentrator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3000 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3080 Concentrator
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.6.7.a
Cisco Vpn 3000 Concentrator Series Software 3.6.7.b
Cisco Vpn 3000 Concentrator Series Software 3.6.7.c
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.5.2
Cisco Vpn 3000 Concentrator Series Software 3.5.3
Cisco Vpn 3000 Concentrator Series Software 3.5.4
Cisco Vpn 3000 Concentrator Series Software 3.5.5
Cisco Vpn 3000 Concentrator Series Software 4.1.5.b
Cisco Vpn 3000 Concentrator Series Software 4.1.7.a
Cisco Vpn 3000 Concentrator Series Software 4.1.7.b
Cisco Vpn 3000 Concentrator Series Software 4.1
NA
CVE-2005-0943
Cisco VPN 3000 series Concentrator running firmware 4.1.7.A and previous versions allows remote malicious users to cause a denial of service (device reload or drop user connection) via a crafted HTTPS packet.
Cisco Vpn 3015 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3080 Concentrator
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
Cisco Vpn 3000 Concentrator Series Software 3.0.4
Cisco Vpn 3000 Concentrator Series Software 3.1
Cisco Vpn 3000 Concentrator Series Software 3.1(rel)
Cisco Vpn 3000 Concentrator Series Software 3.1.1
Cisco Vpn 3000 Concentrator Series Software 3.1.2
Cisco Vpn 3000 Concentrator Series Software 3.1.4
Cisco Vpn 3000 Concentrator Series Software 3.5(rel)
Cisco Vpn 3000 Concentrator Series Software 3.5.1
NA
CVE-2003-0259
Cisco VPN 3000 series concentrators and Cisco VPN 3002 Hardware Client 2.x.x up to and including 3.6.7 allows remote malicious users to cause a denial of service (reload) via a malformed SSH initialization packet.
Cisco Vpn 3015 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3080 Concentrator
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
Cisco Vpn 3000 Concentrator Series Software 3.0.4
Cisco Vpn 3000 Concentrator Series Software 3.1
Cisco Vpn 3000 Concentrator Series Software 3.1(rel)
Cisco Vpn 3000 Concentrator Series Software 3.1.1
Cisco Vpn 3000 Concentrator Series Software 3.1.2
Cisco Vpn 3000 Concentrator Series Software 3.1.4
Cisco Vpn 3000 Concentrator Series Software 3.5(rel)
Cisco Vpn 3000 Concentrator Series Software 3.5.1
Cisco Vpn 3000 Concentrator Series Software 3.5.2
NA
CVE-2003-0260
Cisco VPN 3000 series concentrators and Cisco VPN 3002 Hardware Client 2.x.x up to and including 3.6.7A allow remote malicious users to cause a denial of service (slowdown and possibly reload) via a flood of malformed ICMP packets.
Cisco Vpn 3015 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3080 Concentrator
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
Cisco Vpn 3000 Concentrator Series Software 3.0.4
Cisco Vpn 3000 Concentrator Series Software 3.1
Cisco Vpn 3000 Concentrator Series Software 3.1(rel)
Cisco Vpn 3000 Concentrator Series Software 3.1.1
Cisco Vpn 3000 Concentrator Series Software 3.1.2
Cisco Vpn 3000 Concentrator Series Software 3.1.4
Cisco Vpn 3000 Concentrator Series Software 3.5(rel)
Cisco Vpn 3000 Concentrator Series Software 3.5.1
Cisco Vpn 3000 Concentrator Series Software 3.5.2
NA
CVE-2003-0258
Cisco VPN 3000 series concentrators and Cisco VPN 3002 Hardware Client 3.5.x up to and including 4.0.REL, when enabling IPSec over TCP for a port on the concentrator, allow remote malicious users to reach the private network without authentication.
Cisco Vpn 3015 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3080 Concentrator
Cisco Vpn 3000 Concentrator Series Software 3.5(rel)
Cisco Vpn 3000 Concentrator Series Software 3.5.1
Cisco Vpn 3000 Concentrator Series Software 3.5.2
Cisco Vpn 3000 Concentrator Series Software 3.5.3
Cisco Vpn 3000 Concentrator Series Software 3.5.4
Cisco Vpn 3000 Concentrator Series Software 3.5.5
Cisco Vpn 3000 Concentrator Series Software 3.6
Cisco Vpn 3000 Concentrator Series Software 3.6.1
Cisco Vpn 3000 Concentrator Series Software 3.6.3
Cisco Vpn 3000 Concentrator Series Software 3.6.5
Cisco Vpn 3000 Concentrator Series Software 3.6.7
Cisco Vpn 3000 Concentrator Series Software 3.6.7.a
Cisco Vpn 3000 Concentrator Series Software 3.6.7.b
Cisco Vpn 3000 Concentrator Series Software 3.6.7.c
Cisco Vpn 3000 Concentrator Series Software 3.6.7.d
Cisco Vpn 3000 Concentrator Series Software 3.6.7d
Cisco Vpn 3000 Concentrator Series Software 4.0
Cisco Vpn 3005 Concentrator Software 4.0.1
NA
CVE-2006-3906
Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote malicious users to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOT...
Cisco Ios
Cisco Vpn 3001 Concentrator
Cisco Vpn 3015 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3080 Concentrator
Cisco Adaptive Security Appliance Software 7.0
Cisco Adaptive Security Appliance Software 7.0(4)
Cisco Adaptive Security Appliance Software 7.0(5)
Cisco Adaptive Security Appliance Software 7.0.1.4
Cisco Adaptive Security Appliance Software 7.0.4.3
Cisco Adaptive Security Appliance Software 7.1(2)
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
NA
CVE-2005-4499
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote malicious u...
Cisco Vpn 3001 Concentrator
Cisco Vpn 3015 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3080 Concentrator
Cisco Adaptive Security Appliance Software 7.0
Cisco Adaptive Security Appliance Software 7.0(4)
Cisco Adaptive Security Appliance Software 7.0.1.4
Cisco Adaptive Security Appliance Software 7.0.4.3
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
Cisco Vpn 3000 Concentrator Series Software 3.0.4
Cisco Vpn 3000 Concentrator Series Software 3.1
Cisco Vpn 3000 Concentrator Series Software 3.1(rel)
NA
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Netkit Linux Netkit 0.11
Mit Kerberos 5 1.1
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Freebsd Freebsd 2.2.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started