Логотип exploitDog
bind:CVE-2004-1461
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2004-1461

Количество 2

Количество 2

nvd логотип

CVE-2004-1461

больше 20 лет назад

Cisco Secure Access Control Server (ACS) 3.2(3) and earlier spawns a separate unauthenticated TCP connection on a random port when a user authenticates to the ACS GUI, which allows remote attackers to bypass authentication by connecting to that port from the same IP address.

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-5224-x825-p35j

больше 3 лет назад

Cisco Secure Access Control Server (ACS) 3.2(3) and earlier spawns a separate unauthenticated TCP connection on a random port when a user authenticates to the ACS GUI, which allows remote attackers to bypass authentication by connecting to that port from the same IP address.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2004-1461

Cisco Secure Access Control Server (ACS) 3.2(3) and earlier spawns a separate unauthenticated TCP connection on a random port when a user authenticates to the ACS GUI, which allows remote attackers to bypass authentication by connecting to that port from the same IP address.

CVSS2: 7.5
1%
Низкий
больше 20 лет назад
github логотип
GHSA-5224-x825-p35j

Cisco Secure Access Control Server (ACS) 3.2(3) and earlier spawns a separate unauthenticated TCP connection on a random port when a user authenticates to the ACS GUI, which allows remote attackers to bypass authentication by connecting to that port from the same IP address.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу