Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Secure_access_control_server
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 35 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2005-01-10 | CVE-2004-1099 | Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username. | Secure_access_control_server, Secure_acs_solution_engine | N/A | ||
2003-05-12 | CVE-2003-0210 | Buffer overflow in the administration service (CSAdmin) for Cisco Secure ACS before 3.1.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long user parameter to port 2002. | Secure_access_control_server | N/A | ||
2002-10-04 | CVE-2002-1095 | Cisco VPN 3000 Concentrator before 2.5.2(F), with encryption enabled, allows remote attackers to cause a denial of service (reload) via a Windows-based PPTP client with the "No Encryption" option set. | Secure_access_control_server, Vpn_3000_concentrator_series_software, Vpn_3002_hardware_client | N/A | ||
2002-10-04 | CVE-2002-0938 | Cross-site scripting vulnerability in CiscoSecure ACS 3.0 allows remote attackers to execute arbitrary script or HTML as other web users via the action argument in a link to setup.exe. | Secure_access_control_server | N/A | ||
2002-05-29 | CVE-2002-0241 | NDSAuth.DLL in Cisco Secure Authentication Control Server (ACS) 3.0.1 does not check the Expired or Disabled state of users in the Novell Directory Services (NDS), which could allow those users to authenticate to the server. | Secure_access_control_server | N/A | ||
2002-04-22 | CVE-2002-0160 | The administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to read HTML, Java class, and image files outside the web root via a ..\.. (modified ..) in the URL to port 2002. | Secure_access_control_server | N/A | ||
2002-04-22 | CVE-2002-0159 | Format string vulnerability in the administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to crash the CSADMIN module only (denial of service of administration function) or execute arbitrary code via format strings in the URL to port 2002. | Secure_access_control_server | N/A | ||
2000-12-11 | CVE-2000-1056 | CiscoSecure ACS Server 2.4(2) and earlier allows remote attackers to bypass LDAP authentication on the server if the LDAP server allows null passwords. | Secure_access_control_server | N/A | ||
2000-12-11 | CVE-2000-1055 | Buffer overflow in CiscoSecure ACS Server 2.4(2) and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a large TACACS+ packet. | Secure_access_control_server | N/A | ||
2000-12-11 | CVE-2000-1054 | Buffer overflow in CSAdmin module in CiscoSecure ACS Server 2.4(2) and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a large packet. | Secure_access_control_server | N/A |