Page 14 of 79 results (0.003 seconds)

CVSS: 6.4EPSS: 0%CPEs: 7EXPL: 0

Cisco PIX Firewall 6.0.3 and earlier, and 6.1.x to 6.1.3, do not delete the duplicate ISAKMP SAs for a user's VPN session, which allows local users to hijack a session via a man-in-the-middle attack. • http://www.ciac.org/ciac/bulletins/n-017.shtml http://www.cisco.com/warp/public/707/pix-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10660.php http://www.securityfocus.com/bid/6211 •

CVSS: 5.0EPSS: 0%CPEs: 19EXPL: 0

Buffer overflow in Cisco PIX Firewall 5.2.x to 5.2.8, 6.0.x to 6.0.3, 6.1.x to 6.1.3, and 6.2.x to 6.2.1 allows remote attackers to cause a denial of service via HTTP traffic authentication using (1) TACACS+ or (2) RADIUS. • http://www.ciac.org/ciac/bulletins/n-017.shtml http://www.cisco.com/warp/public/707/pix-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/10661.php http://www.securityfocus.com/bid/6212 •

CVSS: 7.1EPSS: 0%CPEs: 102EXPL: 0

Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144). • http://www.cisco.com/warp/public/707/SSH-scanning.shtml http://www.iss.net/security_center/static/9437.php http://www.kb.cert.org/vuls/id/290140 http://www.securityfocus.com/bid/5114 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

The encryption algorithms for enable and passwd commands on Cisco PIX Firewall can be executed quickly due to a limited number of rounds, which make it easier for an attacker to decrypt the passwords using brute force techniques. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0121.html http://marc.info/?l=bugtraq&m=102651159507659&w=2 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

Cisco PIX firewall manager (PFM) 4.3(2)g logs the enable password in plaintext in the pfm.log file, which could allow local users to obtain the password by reading the file. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0071.html http://www.kb.cert.org/vuls/id/639507 http://www.securityfocus.com/bid/3419 https://exchange.xforce.ibmcloud.com/vulnerabilities/7265 •