Page 14 of 68 results (0.007 seconds)

CVSS: 7.8EPSS: 6%CPEs: 2EXPL: 0

Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets. Cisco PIX 500 y ASA 5500 Series Security Appliances 7.2.2, cuando se configuran para inspeccionar protocolos concretos basados en TCP, permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) mediante paquetes TCP mal-formados. • http://osvdb.org/33062 http://secunia.com/advisories/24160 http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml http://www.securityfocus.com/bid/22561 http://www.securityfocus.com/bid/22562 http://www.securitytracker.com/id?1017651 http://www.securitytracker.com/id?1017652 http://www.vupen.com/english/advisories/2007/0608 https://exchange.xforce.ibmcloud.com/vulnerabilities/32488 •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors. Vulnerabilidad no especificada en Cisco PIX 500 y ASA 5500 Series Security Appliances 7.2.2, cuando se configuran para usar el método de autenticación LOCAL, permite a usuarios remotos autenticados obtener privilegios mediante vectores desconocidos. • http://osvdb.org/33063 http://secunia.com/advisories/24160 http://secunia.com/advisories/24179 http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml http://www.securityfocus.com/bid/22561 http://www.securityfocus.com/bid/22562 http://www.securitytracker.com/id?1017651 http://www.securitytracker.com/id?1017652 http://www.vupen.com/english/advisories/2007/0608 https://exchange.xforce.ibmcloud.com/vulnerabilities/32489 •

CVSS: 2.6EPSS: 1%CPEs: 38EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in the WebVPN feature in the Cisco VPN 3000 Series Concentrators and Cisco ASA 5500 Series Adaptive Security Appliances (ASA), when in WebVPN clientless mode, allow remote attackers to inject arbitrary web script or HTML via the domain parameter in (1) dnserror.html and (2) connecterror.html, aka bugid CSCsd81095 (VPN3k) and CSCse48193 (ASA). NOTE: the vendor states that "WebVPN full-network-access mode" is not affected, despite the claims by the original researcher. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en WebVPN en la serie Cisco VPN 3000 y concentradores Cisco ASA 5500 Series Adaptive Security Appliances (ASA), cuando se encuentra en el modo de WebVPN sin cliente, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro domain en (1) dnserror.html y (2) connecterror.html, también conocido como bugid CSCsd81095 (VPN3k) y CSCse48193 (ASA). NOTA: El fabricante indica que "WebVPN full-network-access mode" no se ve afectada, a pesar de las alegaciones formuladas por el investigador original. • http://secunia.com/advisories/20644 http://securitytracker.com/id?1016252 http://www.cisco.com/warp/public/707/cisco-sr-20060613-webvpn-xss.shtml http://www.osvdb.org/26453 http://www.osvdb.org/26454 http://www.securityfocus.com/archive/1/436479/30/0/threaded http://www.securityfocus.com/bid/18419 http://www.vupen.com/english/advisories/2006/2331 https://exchange.xforce.ibmcloud.com/vulnerabilities/27086 •