Page 17 of 90 results (0.009 seconds)

CVSS: 7.8EPSS: 0%CPEs: 65EXPL: 0

Unspecified vulnerability in the IKE implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.10), and 8.3 before 8.3(1.1) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a crafted IKE message, aka Bug ID CSCte46507. Vulnerabilidad no especificada en la implementación de Cisco Adaptive Security Appliances (ASA) para dispositivos de la serie 5500 con software v7.0 anteriores a v7.0(8.11), v7.1 y v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.15), v8.1 anteriores a v8.1(2.44), v8.2 anteriores a v8.2(2.10), y v8.3 anteriores a v8.3(1.1) y Cisco PIX Security Appliances para dispositivos de la serie 500, permite a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) mediante un mensajes IKE manipulados, también conocido como Bug ID CSCte46507. • http://secunia.com/advisories/40842 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml http://www.securityfocus.com/bid/42190 •

CVSS: 7.8EPSS: 2%CPEs: 6EXPL: 0

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.1.x before 7.1(2)70, 7.2.x before 7.2(4), and 8.0.x before 8.0(3)10 allows remote attackers to cause a denial of service via a crafted TCP ACK packet to the device interface. Adaptive Security Appliance (ASA) de Cisco y PIX security appliance de Cisco versión 7.1.x anterior a 7.1(2)70, versión 7.2.x anterior a 7.2 (4) y versión 8.0.x anterior a 8.0(3)10, permite a los atacantes remotos causar una denegación de servicio por medio de un paquete TCP ACK creado para la interfaz del dispositivo. • http://secunia.com/advisories/30552 http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml http://www.securitytracker.com/id?1020176 http://www.securitytracker.com/id?1020177 http://www.vupen.com/english/advisories/2008/1750/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42835 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 1%CPEs: 6EXPL: 0

Unspecified vulnerability in Cisco PIX 500 Series Security Appliance and 5500 Series Adaptive Security Appliance (ASA) before 7.2(3)6 and 8.0(3), when the Time-to-Live (TTL) decrement feature is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted IP packet. Hay una vulnerabilidad no especificada en PIX 500 Series Security Appliance y 5500 Series Adaptive Security Appliance (ASA) de Cisco anterior a las versiones 7.2 (3) 6 y 8.0 (3), cuando la función de decremento de Time-to-Live (TTL) está habilitada, permite que los atacantes remotos causen una denegación de servicio (recarga del dispositivo) por medio de un paquete IP creado. • http://secunia.com/advisories/28625 http://www.cisco.com/warp/public/707/cisco-sa-20080123-asa.shtml http://www.securityfocus.com/bid/27418 http://www.securitytracker.com/id?1019262 http://www.securitytracker.com/id?1019263 http://www.vupen.com/english/advisories/2008/0259 https://exchange.xforce.ibmcloud.com/vulnerabilities/39862 •

CVSS: 7.1EPSS: 2%CPEs: 4EXPL: 0

Cisco PIX and ASA appliances with 7.1 and 7.2 software, when configured for TLS sessions to the device, allow remote attackers to cause a denial of service (device reload) via a crafted TLS packet, aka CSCsg43276 and CSCsh97120. Cisco PIX y ASA appliances con software 7.1 y 7.2, cuando se configura para sesiones TLS en el dispositivo, permite a atacantes remotos provocar denegación de servicio (recarga de dispositivo) a través de paquetes TLS manipulados, también conocido como CSCsg43276 y CSCsh97120. • http://secunia.com/advisories/27193 http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda56.shtml http://www.securityfocus.com/bid/26104 http://www.securitytracker.com/id?1018826 http://www.securitytracker.com/id?1018827 http://www.vupen.com/english/advisories/2007/3531 https://exchange.xforce.ibmcloud.com/vulnerabilities/37260 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 13%CPEs: 25EXPL: 0

Cisco PIX and ASA appliances with 7.0 through 8.0 software, and Cisco Firewall Services Module (FWSM) 3.1(5) and earlier, allow remote attackers to cause a denial of service (device reload) via a crafted MGCP packet, aka CSCsi90468 (appliance) and CSCsi00694 (FWSM). Cisco PIX y ASA appliances con software 7.0 hasta 8.0, y Cisco Firewall Services Module (FWSM) 3.1(5) y anteriores, permite a atacantes remotos provocar denegación de servicio (recarga de dispositivo) a través de un paquete manipulado MGCP, también conocido como CSCsi90468 (appliance) y CSCsi00694 (FWSM). • http://secunia.com/advisories/27193 http://secunia.com/advisories/27236 http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda56.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda61.shtml http://www.securityfocus.com/bid/26104 http://www.securityfocus.com/bid/26109 http://www.securitytracker.com/id?1018825 http://www.securitytracker.com/id?1018826 http://www.securitytracker.com/id?1018827 http://www.vupen.com/english/advisories/2007/3530 h • CWE-20: Improper Input Validation •