Page 11 of 56 results (0.024 seconds)

CVSS: 7.5EPSS: 1%CPEs: 58EXPL: 0

Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) allows remote attackers to bypass SMTP inspection via vectors involving a prepended space character, aka Bug ID CSCte14901. Vulnerabilidad sin especificar en los dispositivos Cisco Adaptive Security Appliances (ASA) 5500 series con software anterior a 8.2(3). Permite a atacantes remotos evitar la inspección de SMTP a través de vectores que involucran un carácter de espacio añadido al inicio. También conocido como Bug ID CSCte14901. • http://secunia.com/advisories/42931 http://www.cisco.com/en/US/docs/security/asa/asa82/release/notes/asarn82.pdf http://www.securityfocus.com/bid/45767 http://www.securitytracker.com/id?1024963 https://exchange.xforce.ibmcloud.com/vulnerabilities/64607 •

CVSS: 7.8EPSS: 2%CPEs: 60EXPL: 3

The Neighbor Discovery (ND) protocol implementation in the IPv6 stack on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2(3) and earlier, and Cisco PIX Security Appliances devices, allows remote attackers to cause a denial of service (CPU consumption and device hang) by sending many Router Advertisement (RA) messages with different source addresses, as demonstrated by the flood_router6 program in the thc-ipv6 package, aka Bug ID CSCti24526. La implantación del protocolo "Neighbor Discovery" (ND) en la pila IPv6 de los dispositivos Cisco Adaptive Security Appliances (ASA) 5500 series con software 8.2(3) y versiones anteriores, y dispositivos Cisco PIX Security Appliances, permite a atacantes remotos provocar una denegación de servicio (consumo de la CPU y cuelgue del dispositivo) enviando múltiples mensajes de "Router Advertisement" (anuncio de ruta) con direcciones de fuente distintas, como se ha demostrado con el programa flood_router6 del paquete thc-ipv6. También conocido como Bug ID CSCti24526 • http://events.ccc.de/congress/2010/Fahrplan/events/3957.en.html http://mirror.fem-net.de/CCC/27C3/mp3-audio-only/27c3-3957-en-ipv6_insecurities.mp3 http://mirror.fem-net.de/CCC/27C3/mp4-h264-HQ/27c3-3957-en-ipv6_insecurities.mp4 http://www.cisco.com/en/US/docs/security/asa/asa82/release/notes/asarn82.pdf http://www.securityfocus.com/bid/45760 http://www.securitytracker.com/id?1024963 http://www.youtube.com/watch?v=00yjWB6gGy8 https://exchange.xforce.ibmcloud.com/vu • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 2%CPEs: 13EXPL: 0

The Cisco Firewall Services Module (FWSM) 4.0 before 4.0(8), as used in for the Cisco Catalyst 6500 switches, Cisco 7600 routers, and ASA 5500 Adaptive Security Appliances, allows remote attackers to cause a denial of service (crash) via a malformed Skinny Client Control Protocol (SCCP) message. El Cisco Firewall Services Module (FWSM) v4.0 anterior a v4.0(8), que se utiliza en los switches Cisco Catalyst 6500, routers Cisco 7600 y ASA 5500 Adaptive Security Appliances, permite a atacantes remotos provocar una denegación de servicio (cuelgue) a través de mensajes malformados del Skinny Client Control Protocol (SCCP). • http://osvdb.org/62432 http://secunia.com/advisories/38621 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910e.shtml http://www.securityfocus.com/bid/38274 http://www.securitytracker.com/id?1023609 http://www.vupen.com/english/advisories/2010/0418 https://exchange.xforce.ibmcloud.com/vulnerabilities/56333 •

CVSS: 7.8EPSS: 2%CPEs: 3EXPL: 0

Unspecified vulnerability in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.2(4)9 and 7.2(4)10 allows remote attackers to cause a denial of service (device reload) via a crafted IPv6 packet. Vulnerabilidad no especificada en Cisco Adaptive Security Appliances (ASA) 5500 Series y PIX Security Appliances 7.2(4)9 y 7.2(4)10 permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de un paquete IPv6 manipulado. • http://secunia.com/advisories/32391 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a183ba.shtml http://www.securityfocus.com/bid/31863 http://www.securitytracker.com/id?1021086 http://www.securitytracker.com/id?1021087 http://www.vupen.com/english/advisories/2008/2899 https://exchange.xforce.ibmcloud.com/vulnerabilities/46025 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5499 •

CVSS: 7.8EPSS: 2%CPEs: 3EXPL: 0

Memory leak in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 8.0 before 8.0(4) and 8.1 before 8.1(2) allows remote attackers to cause a denial of service (memory consumption) via an unspecified sequence of packets, related to the "initialization code for the hardware crypto accelerator." Fuga de memoria en Cisco Adaptive Security Appliances (ASA) 5500 Series y PIX Security Appliances 8.0 antes de 8.0(4) y 8.1 antes de 8.1(2) permite a atacantes remotos provocar una denegación de servicio (agotamiento de memoria) mediante una secuencia no especificada de paquetes, relacionada con "código de inicialización para el acelerador de hardware criptológico". • http://secunia.com/advisories/32392 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a183ba.shtml http://www.securityfocus.com/bid/31865 http://www.securitytracker.com/id?1021088 http://www.vupen.com/english/advisories/2008/2899 https://exchange.xforce.ibmcloud.com/vulnerabilities/46027 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5597 • CWE-399: Resource Management Errors •