Логотип exploitDog
bind:CVE-2006-3226
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-3226

Количество 2

Количество 2

nvd логотип

CVE-2006-3226

больше 19 лет назад

Cisco Secure Access Control Server (ACS) 4.x for Windows uses the client's IP address and the server's port number to grant access to an HTTP server port for an administration session, which allows remote attackers to bypass authentication via various methods, aka "ACS Weak Session Management Vulnerability."

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-2j6q-wwqq-gqm4

почти 4 года назад

Cisco Secure Access Control Server (ACS) 4.x for Windows uses the client's IP address and the server's port number to grant access to an HTTP server port for an administration session, which allows remote attackers to bypass authentication via various methods, aka "ACS Weak Session Management Vulnerability."

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2006-3226

Cisco Secure Access Control Server (ACS) 4.x for Windows uses the client's IP address and the server's port number to grant access to an HTTP server port for an administration session, which allows remote attackers to bypass authentication via various methods, aka "ACS Weak Session Management Vulnerability."

CVSS2: 7.5
2%
Низкий
больше 19 лет назад
github логотип
GHSA-2j6q-wwqq-gqm4

Cisco Secure Access Control Server (ACS) 4.x for Windows uses the client's IP address and the server's port number to grant access to an HTTP server port for an administration session, which allows remote attackers to bypass authentication via various methods, aka "ACS Weak Session Management Vulnerability."

2%
Низкий
почти 4 года назад

Уязвимостей на страницу