Page 17 of 84 results (0.005 seconds)

CVSS: 7.1EPSS: 2%CPEs: 2EXPL: 0

Memory leak in the crypto functionality in Cisco Adaptive Security Appliance (ASA) 5500 devices 7.2 before 7.2(4)2, 8.0 before 8.0(3)14, and 8.1 before 8.1(1)4, when configured as a clientless SSL VPN endpoint, allows remote attackers to cause a denial of service (memory consumption and VPN hang) via a crafted SSL or HTTP packet, aka Bug ID CSCso66472. Fugas de memoria en la funcionalidad crypto en Cisco Adaptive Security Appliance (ASA) 5500 devices 7.2 versiones anteriores a 7.2(4)2, 8.0 versiones anteriores a 8.0(3)14, y 8.1 versiones anteriores a 8.1(1)4, cuando está configurado como un SSL VPN endpoint sin cliente, permite a atacantes remotos provocar una denegación de servicio (consumo de memoria y cuelgue de VPN) a través de paquetes SSL o HTTP manipulados, también conocido como Bug ID CSCso66472. • http://secunia.com/advisories/31730 http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml http://www.securityfocus.com/bid/30998 http://www.securitytracker.com/id?1020812 https://exchange.xforce.ibmcloud.com/vulnerabilities/44868 • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 2%CPEs: 2EXPL: 0

The HTTP server in Cisco Adaptive Security Appliance (ASA) 5500 devices 8.0 before 8.0(3)15 and 8.1 before 8.1(1)5, when configured as a clientless SSL VPN endpoint, does not properly process URIs, which allows remote attackers to cause a denial of service (device reload) via a URI in a crafted SSL or HTTP packet, aka Bug ID CSCsq19369. Servidor HTTP en los dispositivos Cisco Adaptive Security Appliance (ASA) 5500 8.0 anterior a 8.0(3)15 y 8.1 anterior a 8.1(1)5, cuando se configura como SSL VPN endpoint sin clientes no procesa adecuadamente las URIs, lo que permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) a través de una URI en un paquete SSL o HTTP manipulado, también conocido como Bug ID CSCsq19369. • http://secunia.com/advisories/31730 http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml http://www.securityfocus.com/bid/30998 http://www.securitytracker.com/id?1020812 https://exchange.xforce.ibmcloud.com/vulnerabilities/44869 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in Cisco Adaptive Security Appliance (ASA) 5500 devices 8.0(3)15, 8.0(3)16, 8.1(1)4, and 8.1(1)5, when configured as a clientless SSL VPN endpoint, allows remote attackers to obtain usernames and passwords via unknown vectors, aka Bug ID CSCsq45636. Vulnerabilidad no especificada en Cisco Adaptive Security Appliance (ASA) 5500 dispositivos 8.0(3)15, 8.0(3)16, 8.1(1)4, y 8.1(1)5, cuando se configuran como punto final sin cliente SSL VPN; permite a atacantes remotos obtener nombres de usuario y contraseñas a través de vectores desconocidos. También se conoce como Bug ID CSCsq45636. • http://secunia.com/advisories/31730 http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa http://www.cisco.com/en/US/docs/security/asa/asa81/release/notes/asarn812.html http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml http://www.securityfocus.com/bid/30998 http://www.securitytracker.com/id?1020813 https://exchange.xforce.ibmcloud.com/vulnerabilities/44870 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.1EPSS: 1%CPEs: 6EXPL: 0

Unspecified vulnerability in Cisco PIX 500 Series Security Appliance and 5500 Series Adaptive Security Appliance (ASA) before 7.2(3)6 and 8.0(3), when the Time-to-Live (TTL) decrement feature is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted IP packet. Hay una vulnerabilidad no especificada en PIX 500 Series Security Appliance y 5500 Series Adaptive Security Appliance (ASA) de Cisco anterior a las versiones 7.2 (3) 6 y 8.0 (3), cuando la función de decremento de Time-to-Live (TTL) está habilitada, permite que los atacantes remotos causen una denegación de servicio (recarga del dispositivo) por medio de un paquete IP creado. • http://secunia.com/advisories/28625 http://www.cisco.com/warp/public/707/cisco-sa-20080123-asa.shtml http://www.securityfocus.com/bid/27418 http://www.securitytracker.com/id?1019262 http://www.securitytracker.com/id?1019263 http://www.vupen.com/english/advisories/2008/0259 https://exchange.xforce.ibmcloud.com/vulnerabilities/39862 •