Page 2 of 20 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 77EXPL: 0

A vulnerability in the email message and content filtering for malformed Multipurpose Internet Mail Extensions (MIME) headers of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of the targeted device. Emails that should have been quarantined could instead be processed. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA on both virtual and hardware appliances that are configured with message or content filters to scan incoming email attachments. More Information: CSCuy54740, CSCuy75174. Known Affected Releases: 9.7.1-066 9.5.0-575 WSA10.0.0-000. • http://www.securityfocus.com/bid/93911 http://www.securitytracker.com/id/1037118 http://www.securitytracker.com/id/1037119 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa2 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 41EXPL: 0

Cisco AsyncOS through 9.5.0-444 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (link saturation) by making many HTTP requests for overlapping byte ranges simultaneously, aka Bug ID CSCuz27219. Cisco AsyncOS hasta la versión 9.5.0-444 en dispositivos Web Security Appliance (WSA) permite a atacantes remotos provocar una denegación de servicio (saturación de enlace) haciendo muchas peticiones HTTP para el solapamiento de rangos de byte simultáneamente, vulnerabilidad también conocida como Bug ID CSCuz27219. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-wsa http://www.securityfocus.com/bid/92955 http://www.securitytracker.com/id/1036829 • CWE-399: Resource Management Errors •

CVSS: 5.3EPSS: 0%CPEs: 37EXPL: 0

The proxy process on Cisco Web Security Appliance (WSA) devices through 9.1.0-070 allows remote attackers to cause a denial of service (CPU consumption) by establishing an FTP session and then improperly terminating the control connection after a file transfer, aka Bug ID CSCuy43468. El proceso proxy en dispositivos Cisco Web Security Appliance (WSA) hasta la versión 9.1.0-070 permite a atacantes remotos causar una denegación de servicios (consumo de CPU) estableciendo una sesión FTP y entonces terminando inapropiadamente el control de conexión después de una transferencia de archivo, también conocido como Bug ID CSCuy43468. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160627-wsa http://www.securitytracker.com/id/1036188 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 0

Memory leak in Cisco AsyncOS 8.5 through 9.0 before 9.0.1-162 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via an HTTP file-range request for cached content, aka Bug ID CSCuw97270. Fuga de memoria en Cisco AsyncOS 8.5 hasta la versión 9.0 en versiones anteriores a 9.0.1-162 en dispositivos Web Security Appliance (WSA) permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) a través de una petición HTTP file-range para contenido cacheado, también conocida como Bug ID CSCuw97270. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa2 http://www.securitytracker.com/id/1035909 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

Cisco AsyncOS 8.0 before 8.0.6-119 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (proxy-process hang) via a crafted HTTP POST request, aka Bug ID CSCuo12171. Cisco AsyncOS 8.0 en versiones anteriores a 8.0.6-119 en dispositivos Web Security Appliance (WSA) permite a atacantes remotos provocar una denegación de servicio (colgado del proceso proxy) a través de una petición HTTP POST manipulada, también conocida como Bug ID CSCuo12171. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa1 http://www.securitytracker.com/id/1035908 • CWE-20: Improper Input Validation •