Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tacacs vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-0607
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote malicious users to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as ...
Cisco Ios 15.4\\(2\\)t2
Cisco Ios 15.4\\(2\\)t3
Cisco Ios 15.4\\(1\\)t
Cisco Ios 15.4\\(1\\)t1
Cisco Ios 15.4\\(1\\)t2
Cisco Ios 15.4\\(1\\)t3
Cisco Ios 15.4t
Cisco Ios 15.4\\(1\\)t4
Cisco Ios 15.4\\(2\\)t
Cisco Ios 15.4\\(100\\)t
Cisco Ios 15.4\\(2\\)t1
6.5
CVSSv3
CVE-2019-3753
Dell EMC PowerConnect 8024, 7000, M6348, M6220, M8024 and M8024-K running firmware versions before 5.1.15.2 contain a plain-text password storage vulnerability. TACACS\Radius credentials are stored in plain text in the system settings menu. An authenticated malicious user with ac...
Dell Emc Powerconnect 8024 Firmware
Dell Emc Powerconnect 7000 Firmware
Dell Emc Powerconnect M6348 Firmware
Dell Emc Powerconnect M6220 Firmware
Dell Emc Powerconnect M8024 Firmware
Dell Emc Powerconnect M8024-k Firmware
NA
CVE-2014-6384
Juniper Junos 12.1X44 prior to 12.1X44-D45, 12.1X46 prior to 12.1X46-D25, 12.1X47 prior to 12.1X47-D15, 12.3 prior to 12.3R9, 13.1 prior to 13.1R4-S3, 13.2 prior to 13.2R6, 13.3 prior to 13.3R5, 14.1 prior to 14.1R3, and 14.2 prior to 14.2R1 does not properly handle double quotes...
Juniper Junos 12.1x47
Juniper Junos 12.3
Juniper Junos 13.2
Juniper Junos 12.1x44
Juniper Junos 13.1
Juniper Junos 12.1x46
Juniper Junos 13.3
Juniper Junos 14.1
Juniper Junos 14.2
NA
CVE-2005-1021
Memory leak in Secure Shell (SSH) in Cisco IOS 12.0 up to and including 12.3, when authenticating against a TACACS+ server, allows remote malicious users to cause a denial of service (memory consumption) via an incorrect username or password.
Cisco Ios 12.1ax
Cisco Ios 12.1az
Cisco Ios 12.1eu
Cisco Ios 12.1ew
Cisco Ios 12.1xi
Cisco Ios 12.1xl
Cisco Ios 12.1xv
Cisco Ios 12.1ya
Cisco Ios 12.1yi
Cisco Ios 12.2
Cisco Ios 12.2s
Cisco Ios 12.2se
Cisco Ios 12.2sxb
Cisco Ios 12.2sxd
Cisco Ios 12.2xn
Cisco Ios 12.2xs
Cisco Ios 12.3xd
Cisco Ios 12.3xe
Cisco Ios 12.3xl
Cisco Ios 12.3xm
Cisco Ios 12.3xy
Cisco Ios 12.3ya
8.6
CVSSv3
CVE-2017-3883
A vulnerability in the authentication, authorization, and accounting (AAA) implementation of Cisco Firepower Extensible Operating System (FXOS) and NX-OS System Software could allow an unauthenticated, remote malicious user to cause an affected device to reload. The vulnerability...
Cisco Firepower Extensible Operating System
Cisco Fxos 2.3
Cisco Nx-os 5.2
Cisco Nx-os 6.2
Cisco Nx-os 6.3
Cisco Nx-os 7.3
Cisco Nx-os 8.1
Cisco Nx-os 8.2
Cisco Nx-os
Cisco Nx-os 7.0
Cisco Nx-os 7.0\\(3\\)i3\\(1\\)
Cisco Nx-os 7.1\\(0.1\\)
Cisco Nx-os 6.1
Cisco Nx-os 2.5
Cisco Nx-os 3.0
Cisco Nx-os 3.1
Cisco Nx-os 3.2
NA
CVE-2003-1001
Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote malicious users to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.
Cisco Catalyst 6500 Ws-svc-nam-1 2.2\\(1a\\)
Cisco Catalyst 6500 Ws-x6380-nam 3.1\\(1a\\)
Cisco Catalyst 7600 Ws-svc-nam-1 3.1\\(1a\\)
Cisco Catalyst 7600 Ws-svc-nam-2 3.1\\(1a\\)
Cisco Catos 5.4\\(1\\)
Cisco Catos 7.6\\(1\\)
Cisco Catalyst 6500 Ws-svc-nam-1 3.1\\(1a\\)
Cisco Catalyst 6500 Ws-svc-nam-2 2.2\\(1a\\)
Cisco Catalyst 6500 Ws-svc-nam-2 3.1\\(1a\\)
Cisco Catalyst 6500 Ws-x6380-nam 2.1\\(2\\)
Cisco Catalyst 7600 Ws-x6380-nam 2.1\\(2\\)
Cisco Catalyst 7600 Ws-x6380-nam 3.1\\(1a\\)
Cisco Firewall Services Module
Cisco Firewall Services Module 1.1.2
Cisco Catalyst 6500
Cisco Catalyst 7600 Ws-svc-nam-1 2.2\\(1a\\)
Cisco Catalyst 7600 Ws-svc-nam-2 2.2\\(1a\\)
Cisco Catos 7.5\\(1\\)
NA
CVE-2005-1020
Secure Shell (SSH) 2 in Cisco IOS 12.0 up to and including 12.3 allows remote malicious users to cause a denial of service (device reload) (1) via a username that contains a domain name when using a TACACS+ server to authenticate, (2) when a new SSH session is in the login phase ...
Cisco Ios 12.0\\(24\\)s4
Cisco Ios 12.0\\(24\\)s5
Cisco Ios 12.0db
Cisco Ios 12.0dc
Cisco Ios 12.0sx
Cisco Ios 12.0sy
Cisco Ios 12.0xb
Cisco Ios 12.0xc
Cisco Ios 12.0xj
Cisco Ios 12.0xk
Cisco Ios 12.0xs
Cisco Ios 12.0xt
Cisco Ios 12.1\\(11b\\)e14
Cisco Ios 12.1\\(13\\)e9
Cisco Ios 12.1\\(20\\)ec1
Cisco Ios 12.1\\(20\\)eo
Cisco Ios 12.1cx
Cisco Ios 12.1da
Cisco Ios 12.1eu
Cisco Ios 12.1ev
Cisco Ios 12.1xb
Cisco Ios 12.1xc
NA
CVE-2011-3298
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 prior to 7.0(8.13), 7.1 and 7.2 prior to 7.2(5.3), 8.0 prior to 8.0(5.24), 8.1 prior to 8.1(2.50), 8.2 prior to 8.2(5), 8.3 prior to ...
Cisco Adaptive Security Appliance Software 7.0
Cisco Adaptive Security Appliance Software 7.0\\(0\\)
Cisco Adaptive Security Appliance Software 7.0\\(1\\)
Cisco Adaptive Security Appliance Software 7.0\\(2\\)
Cisco Adaptive Security Appliance Software 7.0\\(4\\)
Cisco Adaptive Security Appliance Software 7.0\\(5\\)
Cisco Adaptive Security Appliance Software 7.0\\(5.2\\)
Cisco Adaptive Security Appliance Software 7.0\\(6\\)
Cisco Adaptive Security Appliance Software 7.0\\(6.7\\)
Cisco Adaptive Security Appliance Software 7.0\\(7\\)
Cisco Adaptive Security Appliance Software 7.0\\(8\\)
Cisco Adaptive Security Appliance Software 7.0.1
Cisco Adaptive Security Appliance Software 7.0.1.4
Cisco Adaptive Security Appliance Software 7.0.2
Cisco Adaptive Security Appliance Software 7.0.4
Cisco Adaptive Security Appliance Software 7.0.4.3
Cisco Adaptive Security Appliance Software 7.0.5
Cisco Adaptive Security Appliance Software 7.0.6
Cisco Adaptive Security Appliance Software 7.0.7
Cisco Adaptive Security Appliance Software 7.0.8
Cisco Adaptive Security Appliance Software 7.1
Cisco Adaptive Security Appliance Software 7.2
8.8
CVSSv3
CVE-2023-20231
A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote malicious user to perform an injection attack against an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sendin...
Cisco Ios Xe 16.12.4
Cisco Ios Xe 16.12.4a
Cisco Ios Xe 16.12.5
Cisco Ios Xe 16.12.5a
Cisco Ios Xe 16.12.5b
Cisco Ios Xe 16.12.6
Cisco Ios Xe 16.12.6a
Cisco Ios Xe 16.12.7
Cisco Ios Xe 16.12.8
Cisco Ios Xe 16.12.9
Cisco Ios Xe 17.2.2
Cisco Ios Xe 17.2.3
Cisco Ios Xe 17.3.1
Cisco Ios Xe 17.3.1a
Cisco Ios Xe 17.3.1w
Cisco Ios Xe 17.3.1x
Cisco Ios Xe 17.3.1z
Cisco Ios Xe 17.3.2
Cisco Ios Xe 17.3.3
Cisco Ios Xe 17.3.4
Cisco Ios Xe 17.3.4a
Cisco Ios Xe 17.3.4b
NA
CVE-2001-0537
HTTP server for Cisco IOS 11.3 to 12.2 allows malicious users to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.
Cisco Ios 12.1xg
Cisco Ios 12.0xc
Cisco Ios 11.3xa
Cisco Ios 12.0xr
Cisco Ios 12.1xm
Cisco Ios 12.1xi
Cisco Ios 12.0st
Cisco Ios 12.1e
Cisco Ios 12.1xc
Cisco Ios 11.3ma
Cisco Ios 12.1xp
Cisco Ios 12.1ya
Cisco Ios 12.1yd
Cisco Ios 12.0dc
Cisco Ios 12.0xq
Cisco Ios 12.1xs
Cisco Ios 12.2xe
Cisco Ios 12.0xe
Cisco Ios 12.1xy
Cisco Ios 12.0xd
Cisco Ios 11.3na
Cisco Ios 12.1xz
4 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »