Page 12 of 98 results (0.009 seconds)

CVSS: 4.2EPSS: 0%CPEs: 3788EXPL: 0

Cisco IOS 12.0 through 15.6, Adaptive Security Appliance (ASA) Software 7.0.1 through 9.7.1.2, NX-OS 4.0 through 12.0, and IOS XE 3.6 through 3.18 are affected by a vulnerability involving the Open Shortest Path First (OSPF) Routing Protocol Link State Advertisement (LSA) database. This vulnerability could allow an unauthenticated, remote attacker to take full control of the OSPF Autonomous System (AS) domain routing table, allowing the attacker to intercept or black-hole traffic. The attacker could exploit this vulnerability by injecting crafted OSPF packets. Successful exploitation could cause the targeted router to flush its routing table and propagate the crafted OSPF LSA type 1 update throughout the OSPF AS domain. To exploit this vulnerability, an attacker must accurately determine certain parameters within the LSA database on the target router. • http://www.securityfocus.com/bid/100005 http://www.securitytracker.com/id/1039005 http://www.securitytracker.com/id/1039006 http://www.securitytracker.com/id/1039007 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170727-ospf • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 2%CPEs: 324EXPL: 1

A vulnerability in Common Internet Filesystem (CIFS) code in the Clientless SSL VPN functionality of Cisco ASA Software, Major Releases 9.0-9.6, could allow an authenticated, remote attacker to cause a heap overflow. The vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by sending a crafted URL to the affected system. An exploit could allow the remote attacker to cause a reload of the affected system or potentially execute code. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. • https://www.exploit-db.com/exploits/41369 http://www.securityfocus.com/bid/96161 http://www.securitytracker.com/id/1037797 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.1EPSS: 0%CPEs: 241EXPL: 0

The DNS implementation in Cisco Adaptive Security Appliance (ASA) Software 7.2 before 7.2(5.16), 8.2 before 8.2(5.57), 8.3 before 8.3(2.44), 8.4 before 8.4(7.28), 8.5 before 8.5(1.24), 8.6 before 8.6(1.17), 8.7 before 8.7(1.16), 9.0 before 9.0(4.33), 9.1 before 9.1(6.1), 9.2 before 9.2(3.4), and 9.3 before 9.3(3) allows man-in-the-middle attackers to cause a denial of service (memory consumption or device outage) by triggering outbound DNS queries and then sending crafted responses to these queries, aka Bug ID CSCuq77655. La implementación DNS en Software Cisco Adaptive Security Appliance (ASA) 7.2 anterior a 7.2(5.16), 8.2 anterior a 8.2(5.57), 8.3 anterior a 8.3(2.44), 8.4 anterior a 8.4(7.28), 8.5 anterior a 8.5(1.24), 8.6 anterior a 8.6(1.17), 8.7 anterior a 8.7(1.16), 9.0 anterior a 9.0(4.33), 9.1 anterior a 9.1(6.1), 9.2 anterior a 9.2(3.4), y 9.3 anterior a 9.3(3) permite a atacantes man-in-the-middle causar una denegación de servicio (corrupción de memoria o interrupción de dispositivo) mediante la provocación de consultas DNS salientes y posteriormente el envío de respuestas manipuladas a estas consultas, también conocido como Bug ID CSCuq77655. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa http://www.securitytracker.com/id/1032045 • CWE-20: Improper Input Validation •

CVSS: 6.4EPSS: 0%CPEs: 114EXPL: 0

The phone-proxy implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0.3.6 and earlier does not properly validate X.509 certificates, which allows remote attackers to cause a denial of service (connection-database corruption) via an invalid entry, aka Bug ID CSCui33299. La implementación phone-proxy en Cisco Adaptive Security Appliance (ASA) Software 9.0.3.6 y anteriores versiones no valida adecuadamente certificados X.509, lo que permite a atacantes remotos provocar una denegación de servicio (corrupción de connection-database) a través de una entrada inválida, también conocido como Bug ID CSCui33299. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6682 http://tools.cisco.com/security/center/viewAlert.x?alertId=31692 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 114EXPL: 0

The auto-update implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0.3.6 and earlier allows remote attackers to cause a denial of service (device reload) via crafted update data, aka Bug ID CSCui33308. La implementación auto-update en Cisco Adaptive Security Appliance (ASA) Software 9.0.3.6 y anteriores versiones permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) a través de datos de actualización manipulados, también conocido como Bug ID CSCui33308. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5568 http://tools.cisco.com/security/center/viewAlert.x?alertId=31693 • CWE-20: Improper Input Validation •