Page 19 of 95 results (0.016 seconds)

CVSS: 5.4EPSS: 2%CPEs: 4EXPL: 0

The Instant Messenger (IM) inspection engine in Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.2.x before 7.2(4), 8.0.x before 8.0(3)10, and 8.1.x before 8.1(1)2 allows remote attackers to cause a denial of service via a crafted packet. Motor de inspección Instant Messenger en Cisco Adaptive Security Appliance ASA) y Cisco PIX security appliance 7.2.x anterior 7.2(4), 8.0.x anterior a 8.0(3)10, y 8.1.x anterior a 8.1(1)2, permite a atacantes remotos provocar una denegación de servicio a trasvés de un paquete manipulado. • http://secunia.com/advisories/30552 http://securitytracker.com/id?1020180 http://securitytracker.com/id?1020181 http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml http://www.vupen.com/english/advisories/2008/1750/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42837 •

CVSS: 7.8EPSS: 1%CPEs: 4EXPL: 0

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.2.x before 7.2(3)2 and 8.0.x before 8.0(2)17 allows remote attackers to cause a denial of service (device reload) via a port scan against TCP port 443 on the device. Cisco Adaptive Security Appliance (ASA) y Cisco PIX security appliance 7.2.x anterior a 7.2(3)2 y v8.0.x anterior a 8.0(2)17, permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) mediante un escaneo de puerto hacia el 443. • http://secunia.com/advisories/30552 http://securitytracker.com/id?1020182 http://securitytracker.com/id?1020183 http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml http://www.vupen.com/english/advisories/2008/1750/references • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 2%CPEs: 4EXPL: 0

Cisco PIX and ASA appliances with 7.1 and 7.2 software, when configured for TLS sessions to the device, allow remote attackers to cause a denial of service (device reload) via a crafted TLS packet, aka CSCsg43276 and CSCsh97120. Cisco PIX y ASA appliances con software 7.1 y 7.2, cuando se configura para sesiones TLS en el dispositivo, permite a atacantes remotos provocar denegación de servicio (recarga de dispositivo) a través de paquetes TLS manipulados, también conocido como CSCsg43276 y CSCsh97120. • http://secunia.com/advisories/27193 http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda56.shtml http://www.securityfocus.com/bid/26104 http://www.securitytracker.com/id?1018826 http://www.securitytracker.com/id?1018827 http://www.vupen.com/english/advisories/2007/3531 https://exchange.xforce.ibmcloud.com/vulnerabilities/37260 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 13%CPEs: 25EXPL: 0

Cisco PIX and ASA appliances with 7.0 through 8.0 software, and Cisco Firewall Services Module (FWSM) 3.1(5) and earlier, allow remote attackers to cause a denial of service (device reload) via a crafted MGCP packet, aka CSCsi90468 (appliance) and CSCsi00694 (FWSM). Cisco PIX y ASA appliances con software 7.0 hasta 8.0, y Cisco Firewall Services Module (FWSM) 3.1(5) y anteriores, permite a atacantes remotos provocar denegación de servicio (recarga de dispositivo) a través de un paquete manipulado MGCP, también conocido como CSCsi90468 (appliance) y CSCsi00694 (FWSM). • http://secunia.com/advisories/27193 http://secunia.com/advisories/27236 http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda56.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda61.shtml http://www.securityfocus.com/bid/26104 http://www.securityfocus.com/bid/26109 http://www.securitytracker.com/id?1018825 http://www.securitytracker.com/id?1018826 http://www.securitytracker.com/id?1018827 http://www.vupen.com/english/advisories/2007/3530 h • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 4%CPEs: 2EXPL: 0

The DHCP relay agent in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 allows remote attackers to cause a denial of service (dropped packets) via a DHCPREQUEST or DHCPINFORM message that causes multiple DHCPACK messages to be sent from DHCP servers to the agent, which consumes the memory allocated for a local buffer. NOTE: this issue only occurs when multiple DHCP servers are used. El agente transmisor DHCP en Cisco Adaptive Security Appliance (ASA) y PIX 7.2 permite a atacantes remotos provocar una denegación de servicio (abandono de paquetes) mediante un mensaje DHCPREQUEST o DHCPINFORM que provoca que múltiples mensajes DHCPACK sean enviados desde servidores DHCP al agente, lo cual consume la memoria reservada para un búfer local. NOTA: esta situación sólo se da cuando se usan múltiples servidores DHCP. • http://secunia.com/advisories/25109 http://www.cisco.com/en/US/products/products_security_response09186a0080833172.html http://www.kb.cert.org/vuls/id/530057 http://www.osvdb.org/35330 http://www.securityfocus.com/bid/23763 http://www.securitytracker.com/id?1017999 http://www.securitytracker.com/id?1018000 http://www.vupen.com/english/advisories/2007/1635 https://exchange.xforce.ibmcloud.com/vulnerabilities/34026 •