CVE-2025-3129
Mié, 02/04/2025 – 22:15
CVE-2025-3129
CVE-2025-3129
Mié, 02/04/2025 – 22:15
CVE-2025-3129
CVE-2025-3122
Mié, 02/04/2025 – 22:15
CVE-2025-3122
CVE-2025-3121
Mié, 02/04/2025 – 22:15
CVE-2025-3121
CVE-2025-3120
Mié, 02/04/2025 – 22:15
CVE-2025-3120
CVE-2025-0014
Mié, 02/04/2025 – 17:15
CVE-2025-0014
CVE-2025-20120
Mié, 02/04/2025 – 17:15
CVE-2025-20120
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
CVE-2025-20203
Mié, 02/04/2025 – 17:15
CVE-2025-20203
The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious code into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials.
{{value}} ["%7b%7bvalue%7d%7d"])}]]
CVE-2025-20139
Mié, 02/04/2025 – 17:15
CVE-2025-20139
This vulnerability is due to improper validation of user-supplied input to chat entry points. An attacker could exploit this vulnerability by sending malicious requests to a messaging chat entry point in the affected application. A successful exploit could allow the attacker to cause the application to stop responding, resulting in a DoS condition. The application may not recover on its own and may need an administrator to manually restart services to recover.
CVE-2025-20212
Mié, 02/04/2025 – 17:15
CVE-2025-20212
This vulnerability exists because a variable is not initialized when an SSL VPN session is established. An attacker could exploit this vulnerability by supplying crafted attributes while establishing an SSL VPN session with an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN sessions and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers without manual intervention.
CVE-2025-31282
Mié, 02/04/2025 – 17:15
CVE-2025-31282
Please note: ths issue has already been addressed on the backend service and is no longer considered an active vulnerability.