10 results (0.025 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

07 Feb 2020 — Cisco ACE A2(3.6) allows log retention DoS. Cisco ACE A2 (versión 3.6), permite una DoS de la retención de registros. • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20130516-CVE-2013-1202 •

CVSS: 7.1EPSS: 0%CPEs: 26EXPL: 0

05 Mar 2018 — Cavium Nitrox SSL, Nitrox V SSL, and TurboSSL software development kits (SDKs) allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack. Los SDK (software development kit) de Cavium Nitrox SSL, Nitrox V SSL y TurboSSL permiten que atacantes remotos descifren datos TLS cifrados aprovechando un oráculo de relleno RSA Bleichenbacher. Esto también se conoce como ataque ROBOT. • http://www.securityfocus.com/bid/102170 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 7.8EPSS: 0%CPEs: 60EXPL: 0

12 Sep 2016 — Cisco ACE30 Application Control Engine Module through A5 3.3 and ACE 4700 Application Control Engine appliances through A5 3.3 allow remote attackers to cause a denial of service (device reload) via crafted (1) SSL or (2) TLS packets, aka Bug ID CSCvb16317. Dispositivos Cisco ACE30 Application Control Engine Module hasta la versión A5 3.3 y ACE 4700 Application Control Engine hasta la versión A5 3.3 permiten a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) a través de paquet... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

16 Sep 2012 — The Cisco Application Control Engine (ACE) module 3.0 for Cisco Catalyst switches and Cisco routers does not properly monitor Load Balancer (LB) queues, which allows remote attackers to cause a denial of service (incorrect memory access and module reboot) via application traffic, aka Bug ID CSCtw70879. El módulo Cisco Application Control Engine (ACE) v3.0 para switches Cisco Catalyst y routers Cisco no supervisa adecuadamente las colas Load Balancer (LB), lo que permite a atacantes remotos provocar una dene... • http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/vA2_3_x/Release/Note/RACEA2_3_X.html • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

26 Feb 2009 — Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.2) and Cisco ACE 4710 Application Control Engine Appliance before A1(8.0) allows remote attackers to cause a denial of service (device reload) via a crafted SNMPv3 packet. Vulnerabilidad no especificada en "Cisco ACE Application Control Engine Module" para Switches Catalyst 6500 y routers anteriores A1(v1.2) y Cisco ACE 4710 "Application Control Engine Appliance" anteriores A1(8.0... • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

26 Feb 2009 — The username command in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers and Cisco ACE 4710 Application Control Engine Appliance stores a cleartext password by default, which allows context-dependent attackers to obtain sensitive information. El comando de nombre de usuario en el modulo Cisco ACE Application Control Engine para los Switches Catalyst 6500 y Routers 7600 y Cisco ACE 4710 Application Control Engine Appliance almacena una contraseña por defecto en texto cl... • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml • CWE-310: Cryptographic Issues •

CVSS: 9.0EPSS: 0%CPEs: 5EXPL: 0

26 Feb 2009 — Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.2) and Cisco ACE 4710 Application Control Engine Appliance before A1(8a) allows remote authenticated users to execute arbitrary operating-system commands through a command line interface (CLI). Vulnerabilidad no especificada en Cisco ACE Application Control Engine Module para Catalyst 6500 Switches y 7600 Routers anterior a A2(1.2) y Cisco ACE 4710 Application Control Engine Appli... • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

26 Feb 2009 — Unspecified vulnerability in the SNMPv2c implementation in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SNMPv1 packet. Vulnerabilidad no especificada en la implementación SNMPv2c en Cisco ACE Application Control Engine Module para Catalyst 6500 Switches y 7600 Routers anteriores a A2(1.3) y Cisco AC... • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

26 Feb 2009 — Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SSH packet. Vulnerabilidad no especificada en "Cisco ACE Application Control Engine Module" para Catalyst 6500 Switches y 7600 Routers anteriores A2(1.3) y Cisco ACE 4710 Application Control Engine Appliance anteriores a A3(2.... • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 0

26 Feb 2009 — Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.1) uses default (1) usernames and (2) passwords for (a) the administrator and (b) web management, which makes it easier for remote attackers to perform configuration changes or obtain operating-system access. El módulo Cisco ACE Application Control Engine para los Switches Catalyst 6500 y Routers 7600 en versiones anteriores a la A2 (1.1) utiliza (1) nombres de usuario por defecto y (2) contraseñas por defect... • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml • CWE-255: Credentials Management Errors •