Page 20 of 258 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 33EXPL: 0

03 May 2012 — Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 through 8.4 allow remote attackers to cause a denial of service (connection limit exceeded) by triggering a large number of stale connections that result in an incorrect value for an MPF connection count, aka Bug ID CSCtv19854. Dispositivos Cisco Adaptive Security Appliances (ASA) 5500 con software 8.0 hasta 8.4 permite a atacantes remotos provocar una denegación de servicio (exceso del límite de conexiones) realizando un gran nú... • http://www.cisco.com/web/software/280775065/89203/ASA-843-Interim-Release-Notes.html • CWE-189: Numeric Errors •

CVSS: 7.8EPSS: 0%CPEs: 26EXPL: 0

02 May 2012 — The ESMTP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 through 8.5 allows remote attackers to cause a denial of service (CPU consumption) via an unspecified closing sequence, aka Bug ID CSCtt32565. La característica de inspección ESMTP en Cisco Adaptive Security Appliances (ASA) 5500 con el software v8.2 a v8.5 permite a atacantes remotos causar una denegación de servicio (consumo de CPU) a través de una secuencia de cierre no se especifica, también co... • http://www.cisco.com/web/software/283878312/88166/ASA-851-Interim-Release-Notes.html • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 46EXPL: 0

02 May 2012 — Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 through 8.4 do not properly perform proxy authentication during attempts to cut through a firewall, which allows remote attackers to obtain sensitive information via a connection attempt, aka Bug ID CSCtx42746. Los dispositivos Cisco Adaptive Security Appliances (ASA) de la serie 5500 con el software v7.2 hasta v8.4 no realiza correctamente la autenticación del proxy a través de un firewall, lo que permite a atacantes remotos obt... • http://secunia.com/advisories/49139 • CWE-287: Improper Authentication •

CVSS: 6.1EPSS: 0%CPEs: 33EXPL: 0

02 May 2012 — CRLF injection vulnerability in /+CSCOE+/logon.html on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 through 8.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors, aka Bug ID CSCth63101. Vulnerabilidad de ejecución CRLF en /+CSCOE+/logon.html en Cisco Adaptive Security Appliances (ASA) 5500 con software v8.0 a v8.4 permite a atacantes remotos inyectar cabeceras HTTP arbitrarias y llevar a cabo ataques... • http://www.cisco.com/web/software/280775065/37740/ASA-805-Interim-Release-Notes.html • CWE-20: Improper Input Validation CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.3EPSS: 0%CPEs: 23EXPL: 0

02 May 2012 — Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 through 8.4 process IKE requests despite a vpnclient mode configuration, which allows remote attackers to obtain potentially sensitive information by reading IKE responder traffic, aka Bug ID CSCtt07749. Cisco Adaptive Security Appliances (ASA) 5500 con el software v8.2 a v8.4 procesa las solicitudes IKE a pesar de la configuración de modo vpnclient, lo que permite a atacantes remotos obtener información sensible mediante la lect... • http://www.cisco.com/web/software/280775065/45357/ASA-825-Interim-Release-Notes.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 2%CPEs: 42EXPL: 0

15 Mar 2012 — The UDP inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.5), 8.3 before 8.3(2.22), 8.4 before 8.4(2.1), and 8.5 before 8.5(1.2) does not properly handle flows, which allows remote attackers to cause a denial of service (device reload) via a crafted series of (1) IPv4 or (2) IPv6 UDP packets, aka Bug ID CSCtq10441. El motor de ... • http://osvdb.org/80043 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 2%CPEs: 46EXPL: 0

15 Mar 2012 — The Threat Detection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.0 through 8.2 before 8.2(5.20), 8.3 before 8.3(2.29), 8.4 before 8.4(3), 8.5 before 8.5(1.6), and 8.6 before 8.6(1.1) allows remote attackers to cause a denial of service (device reload) via (1) IPv4 or (2) IPv6 packets that trigger a shun event, aka Bug ID CSCtw35765. La función de detección de amenazas de dispositivos de la... • http://osvdb.org/80044 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 1%CPEs: 18EXPL: 0

15 Mar 2012 — Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.4 before 8.4(2.11) and 8.5 before 8.5(1.4) allow remote attackers to cause a denial of service (device reload) via (1) IPv4 or (2) IPv6 packets that trigger syslog message 305006, aka Bug ID CSCts39634. Cisco Adaptive Security Appliances (ASA) 5500 Dispositivos de la serie, y el módulo de servicios de ASA (ASASM) en dispositivos cisco Catalyst 6500, con el ... • http://osvdb.org/80045 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 2%CPEs: 166EXPL: 0

15 Mar 2012 — Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 7.0 through 7.2 before 7.2(5.7), 8.0 before 8.0(5.27), 8.1 before 8.1(2.53), 8.2 before 8.2(5.8), 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.2) and the Firewall Services Module (FWSM) 3.1 and 3.2 before 3.2(23) and 4.0 and 4.1 before 4.1(8) in Cisco Catalyst 6500 series devices, when multicast routing is enabled, allow remote attackers to... • http://osvdb.org/80041 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 9%CPEs: 89EXPL: 0

15 Mar 2012 — Buffer overflow in the Cisco Port Forwarder ActiveX control in cscopf.ocx, as distributed through the Clientless VPN feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 through 7.2 before 7.2(5.6), 8.0 before 8.0(5.26), 8.1 before 8.1(2.53), 8.2 before 8.2(5.18), 8.3 before 8.3(2.28), 8.2 before 8.4(2.16), and 8.6 before 8.6(1.1), allows remote attackers to execute arbitrary code via unspecified vectors, aka Bug ID CSCtr00165. Desbordamiento de búfer en el puerto de Cis... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asaclient • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •