Page 11 of 56 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 58EXPL: 0

Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permit packets to pass before the configuration has been loaded, which might allow remote attackers to bypass intended access restrictions by sending network traffic during device startup, aka Bug ID CSCsy86769. Dispositivos Cisco Adaptive Security Appliances (ASA) series 5500 con software anterior a v8.2(3) permite a los paquetes pasar antes de que la configuración se haya cargado, lo que podría permitir a atacantes remotos evitar las restricciones de acceso previstas, mediante el envío de tráfico por la red durante el inicio del dispositivo, también conocido como Bug ID CSCsy86769 • http://secunia.com/advisories/42931 http://www.cisco.com/en/US/docs/security/asa/asa82/release/notes/asarn82.pdf http://www.securityfocus.com/bid/45767 http://www.securitytracker.com/id?1024963 https://exchange.xforce.ibmcloud.com/vulnerabilities/64604 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 58EXPL: 0

Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) do not properly handle Online Certificate Status Protocol (OCSP) connection failures, which allows remote OCSP responders to cause a denial of service (TCP socket exhaustion) by rejecting connection attempts, aka Bug ID CSCsz36816. Los dispositivos Cisco Adaptive Security Appliances (ASA) 5500 series con software anterior a 8.2(3) no manejan apropiadamente los fallos de conexión de OCSP ("Online Certificate Status Protocol"), lo que permite a los emisarios de respuestas OCSP provocar una denegación de servicio (consumo de todos los sockets TCP) rechazando intentos de conexión. También conocido como Bug ID CSCsz36816. • http://secunia.com/advisories/42931 http://www.cisco.com/en/US/docs/security/asa/asa82/release/notes/asarn82.pdf http://www.securityfocus.com/bid/45767 http://www.securitytracker.com/id?1024963 https://exchange.xforce.ibmcloud.com/vulnerabilities/64605 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 2%CPEs: 13EXPL: 0

The Cisco Firewall Services Module (FWSM) 4.0 before 4.0(8), as used in for the Cisco Catalyst 6500 switches, Cisco 7600 routers, and ASA 5500 Adaptive Security Appliances, allows remote attackers to cause a denial of service (crash) via a malformed Skinny Client Control Protocol (SCCP) message. El Cisco Firewall Services Module (FWSM) v4.0 anterior a v4.0(8), que se utiliza en los switches Cisco Catalyst 6500, routers Cisco 7600 y ASA 5500 Adaptive Security Appliances, permite a atacantes remotos provocar una denegación de servicio (cuelgue) a través de mensajes malformados del Skinny Client Control Protocol (SCCP). • http://osvdb.org/62432 http://secunia.com/advisories/38621 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910e.shtml http://www.securityfocus.com/bid/38274 http://www.securitytracker.com/id?1023609 http://www.vupen.com/english/advisories/2010/0418 https://exchange.xforce.ibmcloud.com/vulnerabilities/56333 •

CVSS: 7.8EPSS: 2%CPEs: 3EXPL: 0

Unspecified vulnerability in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.2(4)9 and 7.2(4)10 allows remote attackers to cause a denial of service (device reload) via a crafted IPv6 packet. Vulnerabilidad no especificada en Cisco Adaptive Security Appliances (ASA) 5500 Series y PIX Security Appliances 7.2(4)9 y 7.2(4)10 permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de un paquete IPv6 manipulado. • http://secunia.com/advisories/32391 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a183ba.shtml http://www.securityfocus.com/bid/31863 http://www.securitytracker.com/id?1021086 http://www.securitytracker.com/id?1021087 http://www.vupen.com/english/advisories/2008/2899 https://exchange.xforce.ibmcloud.com/vulnerabilities/46025 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5499 •

CVSS: 7.8EPSS: 2%CPEs: 3EXPL: 0

Memory leak in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 8.0 before 8.0(4) and 8.1 before 8.1(2) allows remote attackers to cause a denial of service (memory consumption) via an unspecified sequence of packets, related to the "initialization code for the hardware crypto accelerator." Fuga de memoria en Cisco Adaptive Security Appliances (ASA) 5500 Series y PIX Security Appliances 8.0 antes de 8.0(4) y 8.1 antes de 8.1(2) permite a atacantes remotos provocar una denegación de servicio (agotamiento de memoria) mediante una secuencia no especificada de paquetes, relacionada con "código de inicialización para el acelerador de hardware criptológico". • http://secunia.com/advisories/32392 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a183ba.shtml http://www.securityfocus.com/bid/31865 http://www.securitytracker.com/id?1021088 http://www.vupen.com/english/advisories/2008/2899 https://exchange.xforce.ibmcloud.com/vulnerabilities/46027 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5597 • CWE-399: Resource Management Errors •