Page 19 of 112 results (0.013 seconds)

CVSS: 7.8EPSS: 2%CPEs: 95EXPL: 0

Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952. Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500 con el software v7.0 anterior a v7.0(8.11), v7.1 y v7.2 anterior a v7.2(5.1), v8.0 anterior a v8.0 (5.19), v8.1 anterior a v8.1 (2.47), v8.2 anterior a v8.2 (2.19), y v8.3 anterior a v8.3 (1.8); dispositivos Cisco PIX Security Appliances Serie 500; y Cisco Firewall Services Module (también conocido como FWSM) v3.1 anterior a v3.1 (20), v3.2 anterior a v3.2 (20), v4.0 anterior a v4.0 (15), y v4.1 anterior a v4.1(5) permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de un mensaje Skinny Client Control Protocol (SCCP) manipulado, también conocido como error ID CSCtg69457 y CSCtl84952. • http://secunia.com/advisories/43453 http://secunia.com/advisories/43488 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml http://www.securityfocus.com/bid/46518 http://www.securitytracker.com/id?1025108 http://www.securitytracker.com/id?1025109 http://www.vupen.com/english/advisories/2011/0493 http://www.vupen.com/english/advisories/2011/0494 https://exchange.xforce.ibmcloud • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 1%CPEs: 27EXPL: 0

Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583. Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500 con el software v8.0 anterior a v8.0 (5.20), v8.1 anterior a v8.1 (2.48), v8.2 anterior a v8.2 (3), y v8.3 anterior a v8.3 (2.1), cuando el protocolo RIP y la funcionalidad Cisco Phone están configuradas, permiten a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) a través de una actualización RIP, también conocido como error ID CSCtg66583 • http://secunia.com/advisories/43488 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml http://www.securitytracker.com/id?1025108 http://www.vupen.com/english/advisories/2011/0493 https://exchange.xforce.ibmcloud.com/vulnerabilities/65590 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 27EXPL: 0

Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352. Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500 con el software v8.0 anterior a v8.0 (5.23), v8.1 anterior a v8.1 (2.49), v8.2 anterior a v8.2 (4.1), y v8.3 anterior a v8.3 (2.13), cuando una entidad emisora de certificados (CA) está configurada, permite a atacantes remotos leer archivos arbitrarios a través de vectores no especificados, también conocido como error ID CSCtk12352 • http://secunia.com/advisories/43488 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml http://www.securitytracker.com/id?1025108 http://www.vupen.com/english/advisories/2011/0493 https://exchange.xforce.ibmcloud.com/vulnerabilities/65591 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 1%CPEs: 63EXPL: 0

Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.12), 7.1 and 7.2 before 7.2(5.2), 8.0 before 8.0(5.21), 8.1 before 8.1(2.49), 8.2 before 8.2(3.6), and 8.3 before 8.3(2.7) and Cisco PIX Security Appliances 500 series devices, when transparent firewall mode is configured but IPv6 is not configured, allow remote attackers to cause a denial of service (packet buffer exhaustion and device outage) via IPv6 traffic, aka Bug ID CSCtj04707. Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500 con el software v7.0 anterior a v7.0(8.12), v7.1 y v7.2 anterior a v7.2(5.2), v8.0 anterior a v8.0 (5.21), v8.1 anterior a v8.1 (2.49), v8.2 anterior a v8.2 (3.6), y v8.3 anterior a v8.3 (2.7); dispositivos Cisco PIX Security Appliances Serie 500 cuando el modo de cortafuegos transparente se configura pero IPv6 no está configurado, permite a atacantes remotos provocar una denegación de servicio (packet buffer exhaustion y corte del dispositivo) a través de tráfico IPv6, también conocido como error ID CSCtj04707. • http://secunia.com/advisories/43488 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml http://www.securitytracker.com/id?1025108 http://www.vupen.com/english/advisories/2011/0493 https://exchange.xforce.ibmcloud.com/vulnerabilities/65589 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 1%CPEs: 62EXPL: 0

Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) allows remote attackers to cause a denial of service (device crash) via multicast traffic, aka Bug IDs CSCtg61810 and CSCtg69742. Vulnerabilidad no especificada en dispositivos Cisco Adaptive Security Appliances (ASA) serie 5500 con software anteriore a v8.3 (2) permite a atacantes remotos provocar una denegación de servicio (caída del dispositivo) a través del tráfico multicast, también conocido como error ID CSCtg61810 y CSCtg69742. • http://secunia.com/advisories/42931 http://www.cisco.com/en/US/docs/security/asa/asa83/release/notes/asarn83.pdf http://www.securityfocus.com/bid/45768 http://www.securitytracker.com/id?1024963 https://exchange.xforce.ibmcloud.com/vulnerabilities/64573 •