Логотип exploitDog
bind:CVE-2011-0963
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2011-0963

Количество 2

Количество 2

nvd логотип

CVE-2011-0963

почти 15 лет назад

The default configuration of the RADIUS authentication feature on the Cisco Network Admission Control (NAC) Guest Server with software before 2.0.3 allows remote attackers to bypass intended access restrictions and obtain network connectivity via unspecified vectors, aka Bug ID CSCtj66922.

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-xrf6-9p6w-m2j5

больше 3 лет назад

The default configuration of the RADIUS authentication feature on the Cisco Network Admission Control (NAC) Guest Server with software before 2.0.3 allows remote attackers to bypass intended access restrictions and obtain network connectivity via unspecified vectors, aka Bug ID CSCtj66922.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2011-0963

The default configuration of the RADIUS authentication feature on the Cisco Network Admission Control (NAC) Guest Server with software before 2.0.3 allows remote attackers to bypass intended access restrictions and obtain network connectivity via unspecified vectors, aka Bug ID CSCtj66922.

CVSS2: 5
0%
Низкий
почти 15 лет назад
github логотип
GHSA-xrf6-9p6w-m2j5

The default configuration of the RADIUS authentication feature on the Cisco Network Admission Control (NAC) Guest Server with software before 2.0.3 allows remote attackers to bypass intended access restrictions and obtain network connectivity via unspecified vectors, aka Bug ID CSCtj66922.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу