Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco vpn 3000 concentrator series software 2.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2002-0012
Vulnerabilities in a large number of SNMP implementations allow remote malicious users to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into m...
Snmp Snmp
10
CVSSv2
CVE-2002-0013
Vulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote malicious users to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test...
Snmp Snmp
1 EDB exploit
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Netkit Linux Netkit 0.11
Mit Kerberos 5 1.1
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Freebsd Freebsd 2.2.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
1 EDB exploit
7.5
CVSSv2
CVE-2005-4499
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote malicious u...
Cisco Vpn 3001 Concentrator
Cisco Vpn 3015 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3080 Concentrator
Cisco Adaptive Security Appliance Software 7.0
Cisco Adaptive Security Appliance Software 7.0(4)
Cisco Adaptive Security Appliance Software 7.0.1.4
Cisco Adaptive Security Appliance Software 7.0.4.3
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
Cisco Vpn 3000 Concentrator Series Software 3.0.4
Cisco Vpn 3000 Concentrator Series Software 3.1
Cisco Vpn 3000 Concentrator Series Software 3.1(rel)
7.5
CVSSv2
CVE-2002-1098
Cisco VPN 3000 Concentrator 2.2.x, and 3.x prior to 3.5.3, adds an "HTTPS on Public Inbound (XML-Auto)(forward/in)" rule but sets the protocol to "ANY" when the XML filter configuration is enabled, which ultimately allows arbitrary traffic to pass through the ...
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0(rel)
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
Cisco Vpn 3000 Concentrator Series Software 3.0.4
Cisco Vpn 3000 Concentrator Series Software 3.1
Cisco Vpn 3000 Concentrator Series Software 3.1(rel)
Cisco Vpn 3000 Concentrator Series Software 3.1.1
Cisco Vpn 3000 Concentrator Series Software 3.1.2
Cisco Vpn 3000 Concentrator Series Software 3.1.4
Cisco Vpn 3000 Concentrator Series Software 3.5(rel)
Cisco Vpn 3000 Concentrator Series Software 3.5.1
Cisco Vpn 3000 Concentrator Series Software 3.5.2
Cisco Vpn 3002 Hardware Client
7.5
CVSSv2
CVE-2002-1096
Cisco VPN 3000 Concentrator 2.2.x, and 3.x prior to 3.5.1, allows restricted administrators to obtain user passwords that are stored in plaintext in HTML source code.
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0(rel)
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
Cisco Vpn 3000 Concentrator Series Software 3.0.4
Cisco Vpn 3000 Concentrator Series Software 3.1
Cisco Vpn 3000 Concentrator Series Software 3.1(rel)
Cisco Vpn 3000 Concentrator Series Software 3.1.1
Cisco Vpn 3000 Concentrator Series Software 3.1.2
Cisco Vpn 3000 Concentrator Series Software 3.5(rel)
Cisco Vpn 3002 Hardware Client
7.5
CVSSv2
CVE-2002-1097
Cisco VPN 3000 Concentrator 2.2.x, and 3.x prior to 3.5.2, allows restricted administrators to obtain certificate passwords that are stored in plaintext in the HTML source code for Certificate Management pages.
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0(rel)
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
Cisco Vpn 3000 Concentrator Series Software 3.0.4
Cisco Vpn 3000 Concentrator Series Software 3.1
Cisco Vpn 3000 Concentrator Series Software 3.1(rel)
Cisco Vpn 3000 Concentrator Series Software 3.1.1
Cisco Vpn 3000 Concentrator Series Software 3.1.2
Cisco Vpn 3000 Concentrator Series Software 3.5(rel)
Cisco Vpn 3002 Hardware Client
5
CVSSv2
CVE-2006-3906
Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote malicious users to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOT...
Cisco Ios
Cisco Vpn 3001 Concentrator
Cisco Vpn 3015 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3080 Concentrator
Cisco Adaptive Security Appliance Software 7.0
Cisco Adaptive Security Appliance Software 7.0(4)
Cisco Adaptive Security Appliance Software 7.0(5)
Cisco Adaptive Security Appliance Software 7.0.1.4
Cisco Adaptive Security Appliance Software 7.0.4.3
Cisco Adaptive Security Appliance Software 7.1(2)
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
5
CVSSv2
CVE-2005-3669
Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in multiple Cisco products allow remote malicious users to cause a denial of service (device reset) via certain malformed IKE packets, as demonstrated by the PROTOS ISAKMP Test Suit...
Cisco Firewall Services Module
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1.2
Cisco Firewall Services Module 1.1 (3.005)
Cisco Firewall Services Module 2.1 (0.208)
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.5.2
Cisco Vpn 3000 Concentrator Series Software 3.5.3
Cisco Vpn 3000 Concentrator Series Software 3.5.4
Cisco Vpn 3000 Concentrator Series Software 3.5.5
Cisco Vpn 3000 Concentrator Series Software 4.1.5.b
Cisco Vpn 3000 Concentrator Series Software 4.1.7.a
Cisco Vpn 3000 Concentrator Series Software 4.1.7.b
Cisco Vpn 3000 Concentrator Series Software 4.7.1
Cisco Vpn 3000 Concentrator Series Software 4.7.1.f
Cisco Vpn 3000 Concentrator Series Software 3.1
Cisco Vpn 3000 Concentrator Series Software 3.1(rel)
Cisco Vpn 3000 Concentrator Series Software 3.1.1
5
CVSSv2
CVE-2005-2025
Cisco VPN 3000 Concentrator prior to 4.1.7.F allows remote malicious users to determine valid groupnames by sending an IKE Aggressive Mode packet with the groupname in the ID field, which generates a response if the groupname is valid, but does not generate a response for an inva...
Cisco Vpn 3015 Concentrator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3000 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3080 Concentrator
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.6.7.a
Cisco Vpn 3000 Concentrator Series Software 3.6.7.b
Cisco Vpn 3000 Concentrator Series Software 3.6.7.c
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.5.2
Cisco Vpn 3000 Concentrator Series Software 3.5.3
Cisco Vpn 3000 Concentrator Series Software 3.5.4
Cisco Vpn 3000 Concentrator Series Software 3.5.5
Cisco Vpn 3000 Concentrator Series Software 4.1.5.b
Cisco Vpn 3000 Concentrator Series Software 4.1.7.a
Cisco Vpn 3000 Concentrator Series Software 4.1.7.b
Cisco Vpn 3000 Concentrator Series Software 4.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »