CVE-2016-9225
https://notcve.org/view.php?id=CVE-2016-9225
A vulnerability in the data plane IP fragment handler of the Cisco Adaptive Security Appliance (ASA) CX Context-Aware Security module could allow an unauthenticated, remote attacker to cause the CX module to be unable to process further traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to improper handling of IP fragments. An attacker could exploit this vulnerability by sending crafted fragmented IP traffic across the CX module. An exploit could allow the attacker to exhaust free packet buffers in shared memory (SHM), causing the CX module to be unable to process further traffic, resulting in a DoS condition. This vulnerability affects all versions of the ASA CX Context-Aware Security module. • http://www.securityfocus.com/bid/95788 http://www.securitytracker.com/id/1037696 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170125-cas • CWE-399: Resource Management Errors •
CVE-2016-1301
https://notcve.org/view.php?id=CVE-2016-1301
The RBAC implementation in Cisco ASA-CX Content-Aware Security software before 9.3.1.1(112) and Cisco Prime Security Manager (PRSM) software before 9.3.1.1(112) allows remote authenticated users to change arbitrary passwords via a crafted HTTP request, aka Bug ID CSCuo94842. La implementación RBAC en Cisco ASA-CX Content-Aware Security software anterior a 9.3.1.1(112) y Cisco Prime Security Manager (PRSM) software anterior a 9.3.1.1(112) permite a usuarios remotos autenticados cambiar contraseñas arbitrarias a través de una petición HTTP manipulada, también conocido como Bug ID CSCuo94842. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-prsm http://www.securitytracker.com/id/1034926 http://www.securitytracker.com/id/1034927 • CWE-284: Improper Access Control •
CVE-2015-6344
https://notcve.org/view.php?id=CVE-2015-6344
The web-based GUI in Cisco Adaptive Security Appliance (ASA) CX Context-Aware Security 9.3(4.1.11) allows remote authenticated users to bypass intended access restrictions and obtain sensitive user information via an unspecified HTTP request, aka Bug ID CSCuv74105. La GUI basasa en web en Cisco Adaptive Security Appliance (ASA) CX Context-Aware Security 9.3(4.1.11) permite a usuarios remotos autenticados eludir las restricciones destinadas al acceso y obtener información sensible del usuario a través de una petición HTTP no especificada, también conocida como Bug ID CSCuv74105. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151027-cas http://www.securitytracker.com/id/1034001 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2015-0678
https://notcve.org/view.php?id=CVE-2015-0678
The virtualization layer in Cisco ASA FirePOWER Software before 5.3.1.2 and 5.4.x before 5.4.0.1 and ASA Context-Aware (CX) Software before 9.3.2.1-9 allows remote attackers to cause a denial of service (device reload) by rapidly sending crafted packets to the management interface, aka Bug IDs CSCus11007 and CSCun56954. La capa de virtualización en Software Cisco ASA FirePOWER anterior a 5.3.1.2 y 5.4.x anterior a 5.4.0.1 y Software ASA Context-Aware (CX) anterior a 9.3.2.1-9 permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) mediante el envío rápido de paquetes manipulados a la interfaz de gestión, también conocido como Bug IDs CSCus11007 y CSCun56954. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-cxfp http://www.securitytracker.com/id/1032046 • CWE-20: Improper Input Validation •
CVE-2013-1203
https://notcve.org/view.php?id=CVE-2013-1203
Cisco ASA CX Context-Aware Security Software allows remote attackers to cause a denial of service (device reload) via crafted TCP packets that appear to have been forwarded by a Cisco Adaptive Security Appliances (ASA) device, aka Bug ID CSCue88386. Cisco ASA CX Context-Aware Security Software permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de paquetes TCP manipulados que parecen haber sido reenviados por el dispositivo a Cisco Adaptive Security Appliances (ASA). Aka Bug ID CSCue88386. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1203 • CWE-20: Improper Input Validation •