Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco secure access control system 5.2 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2015-0290
The multi-block feature in the ssl3_write_bytes function in s3_pkt.c in OpenSSL 1.0.2 prior to 1.0.2a on 64-bit x86 platforms with AES NI support does not properly handle certain non-blocking I/O cases, which allows remote malicious users to cause a denial of service (pointer cor...
Openssl Openssl 1.0.2
446
VMScore
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 prior to 1.0.2a allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
Openssl Openssl 1.0.2
3 Github repositories
2 Articles
445
VMScore
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected ...
Openssl Openssl 1.0.1j
890
VMScore
CVE-2014-0648
The RMI interface in Cisco Secure Access Control System (ACS) 5.x prior to 5.5 does not properly enforce authentication and authorization requirements, which allows remote malicious users to obtain administrative access via a request to this interface, aka Bug ID CSCud75187.
Cisco Secure Access Control System 5.3.0.40.1
Cisco Secure Access Control System 5.3.0.40.7
Cisco Secure Access Control System 5.3.0.40.9
Cisco Secure Access Control System 5.3.0.40.2
Cisco Secure Access Control System 5.4.0.46.3
Cisco Secure Access Control System 5.4.0.46.2
Cisco Secure Access Control System 5.4.0.46.4
Cisco Secure Access Control System 5.3.0.40.6
Cisco Secure Access Control System 5.3.0.40.5
Cisco Secure Access Control System 5.2
Cisco Secure Access Control System 5.2.0.26
Cisco Secure Access Control System 5.3.0.40.3
Cisco Secure Access Control System 5.4.0.46.5
Cisco Secure Access Control System 5.1.0.44.2
Cisco Secure Access Control System 5.3.0.40.4
Cisco Secure Access Control System 5.3.0.40.8
Cisco Secure Access Control System 5.1.0.44
Cisco Secure Access Control System 5.1.0.44.5
Cisco Secure Access Control System 5.1.0.44.3
Cisco Secure Access Control System 5.1.0.44.1
Cisco Secure Access Control System
Cisco Secure Access Control System 5.2.0.26.2
801
VMScore
CVE-2014-0649
The RMI interface in Cisco Secure Access Control System (ACS) 5.x prior to 5.5 does not properly enforce authorization requirements, which allows remote authenticated users to obtain superadmin access via a request to this interface, aka Bug ID CSCud75180.
Cisco Secure Access Control System 5.3.0.40.1
Cisco Secure Access Control System 5.3.0.40.7
Cisco Secure Access Control System 5.3.0.40.9
Cisco Secure Access Control System 5.3.0.40.2
Cisco Secure Access Control System 5.4.0.46.3
Cisco Secure Access Control System 5.4.0.46.2
Cisco Secure Access Control System 5.4.0.46.4
Cisco Secure Access Control System 5.3.0.40.6
Cisco Secure Access Control System 5.3.0.40.5
Cisco Secure Access Control System 5.2
Cisco Secure Access Control System 5.2.0.26
Cisco Secure Access Control System 5.3.0.40.3
Cisco Secure Access Control System 5.4.0.46.5
Cisco Secure Access Control System 5.1.0.44.2
Cisco Secure Access Control System 5.3.0.40.4
Cisco Secure Access Control System 5.3.0.40.8
Cisco Secure Access Control System 5.1.0.44
Cisco Secure Access Control System 5.1.0.44.5
Cisco Secure Access Control System 5.1.0.44.3
Cisco Secure Access Control System 5.1.0.44.1
Cisco Secure Access Control System
Cisco Secure Access Control System 5.2.0.26.2
1 Article
890
VMScore
CVE-2014-0650
The web interface in Cisco Secure Access Control System (ACS) 5.x prior to 5.4 Patch 3 allows remote malicious users to execute arbitrary operating-system commands via a request to this interface, aka Bug ID CSCue65962.
Cisco Secure Access Control System 5.3.0.40.1
Cisco Secure Access Control System 5.3.0.40.7
Cisco Secure Access Control System 5.3.0.40.9
Cisco Secure Access Control System 5.3.0.40.2
Cisco Secure Access Control System
Cisco Secure Access Control System 5.3.0.40.6
Cisco Secure Access Control System 5.3.0.40.5
Cisco Secure Access Control System 5.2
Cisco Secure Access Control System 5.2.0.26
Cisco Secure Access Control System 5.3.0.40.3
Cisco Secure Access Control System 5.1.0.44.2
Cisco Secure Access Control System 5.3.0.40.4
Cisco Secure Access Control System 5.3.0.40.8
Cisco Secure Access Control System 5.1.0.44
Cisco Secure Access Control System 5.1.0.44.5
Cisco Secure Access Control System 5.1.0.44.3
Cisco Secure Access Control System 5.1.0.44.1
Cisco Secure Access Control System 5.2.0.26.2
Cisco Secure Access Control System 5.1
Cisco Secure Access Control System 5.2.0.26.1
Cisco Secure Access Control System 5.4.0.46.1
Cisco Secure Access Control System 5.1.0.44.4
445
VMScore
CVE-2012-5424
Cisco Secure Access Control System (ACS) 5.x prior to 5.2 Patch 11 and 5.3 prior to 5.3 Patch 7, when a certain configuration involving TACACS+ and LDAP is used, does not properly validate passwords, which allows remote malicious users to bypass authentication by sending a valid ...
Cisco Secure Access Control Server 5.2
Cisco Secure Access Control Server 5.3
Cisco Secure Access Control Server 5.1
Cisco Secure Access Control Server 5.0
540
VMScore
CVE-2011-0951
The web-based management interface in Cisco Secure Access Control System (ACS) 5.1 prior to 5.1.0.44.6 and 5.2 prior to 5.2.0.26.3 allows remote malicious users to change arbitrary user passwords via unspecified vectors, aka Bug ID CSCtl77440.
Cisco Secure Access Control System 5.2
Cisco Secure Access Control System 5.2.0.26
Cisco Secure Access Control System 5.1.0.44.2
Cisco Secure Access Control System 5.1.0.44
Cisco Secure Access Control System 5.1.0.44.5
Cisco Secure Access Control System 5.1.0.44.3
Cisco Secure Access Control System 5.1.0.44.1
Cisco Secure Access Control System 5.2.0.26.2
Cisco Secure Access Control System 5.1
Cisco Secure Access Control System 5.2.0.26.1
Cisco Secure Access Control System 5.1.0.44.4
1000
VMScore
CVE-2008-0960
SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x prior to 5.2.4.1, 5.3.x prior to 5.3.2.1, and 5.4.x prior to 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 up to and including 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3R...
Juniper Session And Resource Control 1.0
Juniper Session And Resource Control 2.0
Juniper Src Pe 1.0
Juniper Src Pe 2.0
1 EDB exploit
1000
VMScore
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.3.2
Sgi Irix 3.3.1
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.2
Ibm Aix 4.3.2
Sco Openserver 5.0
Ibm Aix 4.3
Sun Sunos 5.3
Hp Hp-ux 11.11
Hp Hp-ux 10.01
Sun Solaris 2.4
Hp Hp-ux 10.00
Sun Solaris 2.5.1
Sun Solaris 2.5
Sco Openserver 5.0.2
Sun Sunos 5.7
Sun Sunos 5.5
Sun Sunos 5.8
Sco Openserver 5.0.5
Hp Hp-ux 11.00
Hp Hp-ux 11.0.4
8 EDB exploits
2 Github repositories
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-28995
CVE-2024-36680
CVE-2024-35537
unauthorized
CVE-2024-21518
CVE-2024-37673
cross-site scripting
SSRF
CVE-2024-6241
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3