Page 16 of 79 results (0.011 seconds)

CVSS: 7.1EPSS: 0%CPEs: 33EXPL: 0

Race condition in the HTTP Deep Packet Inspection (DPI) feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(5.5), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.4), 9.0.x before 9.0(1.4), and 9.1.x before 9.1(1.2), in certain conditions involving the spoof-server option or ActiveX or Java response inspection, allows remote attackers to cause a denial of service (device reload) via a crafted HTTP response, aka Bug ID CSCud37992. Condición de carrera en la función HTTP Deep Packet Inspection (DPI) en Cisco Adaptive Security Appliance (ASA) Software 8.2.x anterior a 8.2(5.46), 8.3.x anterior a 8.3(2.39), 8.4.x anterior a 8.4(5.5), 8.5.x anterior a 8.5(1.18), 8.6.x anterior a 8.6(1.12), 8.7.x anterior a 8.7(1.4), 9.0.x anterior a 9.0(1.4), y 9.1.x anterior a 9.1(1.2), que en ciertas condiciones que implican la opción spoof-server o ActiveX o inspección de respuesta de Java, permite a atacantes remotos provocar una denegación de servicio (recarga dispositivo) a través de una respuesta HTTP manipulada, también conocido como Bug ID CSCud37992. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5512 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.1EPSS: 0%CPEs: 168EXPL: 0

The SQL*Net inspection engine in Cisco Adaptive Security Appliance (ASA) Software 7.x before 7.2(5.12), 8.x before 8.2(5.44), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.6), 9.0.x before 9.0(2.10), and 9.1.x before 9.1(2) and Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(27) and 4.x before 4.1(14) allows remote attackers to cause a denial of service (device reload) via crafted segmented Transparent Network Substrate (TNS) packets, aka Bug ID CSCub98434. El motor de SQL*Net inspection en Cisco Adaptive Security Appliance (ASA) 7.x anteriores a 7.2(5.12), 8.x anteriores a 8.2(5.44), 8.3.x anteriores a 8.3(2.39), 8.4.x anteriores a 8.4(6), 8.5.x anteriores a 8.5(1.18), 8.6.x anteriores a 8.6(1.12), 8.7.x anteriores a 8.7(1.6), 9.0.x anteriores a 9.0(2.10) y 9.1.x anteriores a 9.1(2) y Firewall Services Modue (FWSM) 3.1.x y 3.2.x anteriores a 3.2(27) y 4.x anteriores a 4.1(14) permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) a través de paquetes segmentados Transparent Network Substrate (TNS) manipulados, tambien conocido como Bug ID CSCub98434. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5508 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

The IPsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 before 9.1(1.7), when an IPsec VPN tunnel is enabled, allows remote attackers to cause a denial of service (device reload) via a (1) ICMP or (2) ICMPv6 packet that is improperly handled during decryption, aka Bug ID CSCue18975. La implementacion IPSec en Cisco Adaptive Security Appliance (ASA) 9.1 anteriores a 9.2(1.7), cuando un tunel IPSec VPN está habilitado, permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) a través de un paquete (1) ICMP o (2) ICMPv6 que es manejado incorrectamente durante el descifrado, tambien conocido como Bug ID CSCue18975. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5507 • CWE-310: Cryptographic Issues •

CVSS: 7.8EPSS: 0%CPEs: 107EXPL: 0

The authentication-proxy implementation on Cisco Adaptive Security Appliances (ASA) devices with software 7.x before 7.2(5.10), 8.0 before 8.0(5.31), 8.1 and 8.2 before 8.2(5.38), 8.3 before 8.3(2.37), 8.4 before 8.4(5.3), 8.5 and 8.6 before 8.6(1.10), 8.7 before 8.7(1.4), 9.0 before 9.0(1.1), and 9.1 before 9.1(1.2) allows remote attackers to cause a denial of service (device reload) via a crafted URL, aka Bug ID CSCud16590. La implementación de autenticación de proxy de Cisco Adaptive Security Appliances (ASA) los dispositivos con v7.x antes de 7.2(5.10), v8.0 antes de 8.0(5.31), v8.1 y 8.2 antes de v8.2(5.38), v8.3 antes de v8.3(2.37), v8.4 antes de v8.4(5.3), v8.5 y v8.6 antes de v8.6(1.10), v8.7 antes de v8.7(1.4), v9.0 antes de 9.0(1.1), y v9.1 antes de 9.1(1.2) permite a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) a través de un URL elaborado, CSCud16590 también conocido como Bug ID. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asa http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1150 • CWE-287: Improper Authentication •