CVE-2002-2140
https://notcve.org/view.php?id=CVE-2002-2140
Buffer overflow in Cisco PIX Firewall 5.2.x to 5.2.8, 6.0.x to 6.0.3, 6.1.x to 6.1.3, and 6.2.x to 6.2.1 allows remote attackers to cause a denial of service via HTTP traffic authentication using (1) TACACS+ or (2) RADIUS. • http://www.ciac.org/ciac/bulletins/n-017.shtml http://www.cisco.com/warp/public/707/pix-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10661.php http://www.securityfocus.com/bid/6212 •
CVE-2002-2139
https://notcve.org/view.php?id=CVE-2002-2139
Cisco PIX Firewall 6.0.3 and earlier, and 6.1.x to 6.1.3, do not delete the duplicate ISAKMP SAs for a user's VPN session, which allows local users to hijack a session via a man-in-the-middle attack. • http://www.ciac.org/ciac/bulletins/n-017.shtml http://www.cisco.com/warp/public/707/pix-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10660.php http://www.securityfocus.com/bid/6211 •
CVE-2002-1024
https://notcve.org/view.php?id=CVE-2002-1024
Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144). • http://www.cisco.com/warp/public/707/SSH-scanning.shtml http://www.iss.net/security_center/static/9437.php http://www.kb.cert.org/vuls/id/290140 http://www.securityfocus.com/bid/5114 • CWE-399: Resource Management Errors •
CVE-2002-0954
https://notcve.org/view.php?id=CVE-2002-0954
The encryption algorithms for enable and passwd commands on Cisco PIX Firewall can be executed quickly due to a limited number of rounds, which make it easier for an attacker to decrypt the passwords using brute force techniques. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0121.html http://marc.info/?l=bugtraq&m=102651159507659&w=2 •
CVE-2001-1098
https://notcve.org/view.php?id=CVE-2001-1098
Cisco PIX firewall manager (PFM) 4.3(2)g logs the enable password in plaintext in the pfm.log file, which could allow local users to obtain the password by reading the file. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0071.html http://www.kb.cert.org/vuls/id/639507 http://www.securityfocus.com/bid/3419 https://exchange.xforce.ibmcloud.com/vulnerabilities/7265 •