Page 25 of 127 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 39EXPL: 0

Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc77567. Vulnerabilidad no especificada en la característica de inspección SunRPC en dispositivos Cisco Adaptive Security Appliances (ASA) serie 5500 con software v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.19), v8.1 anteriores a v8.1(2.47), y v8.2 anteriores a v8.2(2) y Cisco PIX Security Appliances 500, permite a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) mediante un mensajes SunRPC UDP manipulados, también conocido como Bug ID CSCtc77567. • http://secunia.com/advisories/40842 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml •

CVSS: 7.8EPSS: 2%CPEs: 6EXPL: 0

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.1.x before 7.1(2)70, 7.2.x before 7.2(4), and 8.0.x before 8.0(3)10 allows remote attackers to cause a denial of service via a crafted TCP ACK packet to the device interface. Adaptive Security Appliance (ASA) de Cisco y PIX security appliance de Cisco versión 7.1.x anterior a 7.1(2)70, versión 7.2.x anterior a 7.2 (4) y versión 8.0.x anterior a 8.0(3)10, permite a los atacantes remotos causar una denegación de servicio por medio de un paquete TCP ACK creado para la interfaz del dispositivo. • http://secunia.com/advisories/30552 http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml http://www.securitytracker.com/id?1020176 http://www.securitytracker.com/id?1020177 http://www.vupen.com/english/advisories/2008/1750/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42835 • CWE-20: Improper Input Validation •

CVSS: 5.4EPSS: 2%CPEs: 4EXPL: 0

The Instant Messenger (IM) inspection engine in Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.2.x before 7.2(4), 8.0.x before 8.0(3)10, and 8.1.x before 8.1(1)2 allows remote attackers to cause a denial of service via a crafted packet. Motor de inspección Instant Messenger en Cisco Adaptive Security Appliance ASA) y Cisco PIX security appliance 7.2.x anterior 7.2(4), 8.0.x anterior a 8.0(3)10, y 8.1.x anterior a 8.1(1)2, permite a atacantes remotos provocar una denegación de servicio a trasvés de un paquete manipulado. • http://secunia.com/advisories/30552 http://securitytracker.com/id?1020180 http://securitytracker.com/id?1020181 http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml http://www.vupen.com/english/advisories/2008/1750/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42837 •

CVSS: 7.8EPSS: 1%CPEs: 4EXPL: 0

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.2.x before 7.2(3)2 and 8.0.x before 8.0(2)17 allows remote attackers to cause a denial of service (device reload) via a port scan against TCP port 443 on the device. Cisco Adaptive Security Appliance (ASA) y Cisco PIX security appliance 7.2.x anterior a 7.2(3)2 y v8.0.x anterior a 8.0(2)17, permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) mediante un escaneo de puerto hacia el 443. • http://secunia.com/advisories/30552 http://securitytracker.com/id?1020182 http://securitytracker.com/id?1020183 http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml http://www.vupen.com/english/advisories/2008/1750/references • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 1%CPEs: 6EXPL: 0

Unspecified vulnerability in Cisco PIX 500 Series Security Appliance and 5500 Series Adaptive Security Appliance (ASA) before 7.2(3)6 and 8.0(3), when the Time-to-Live (TTL) decrement feature is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted IP packet. Hay una vulnerabilidad no especificada en PIX 500 Series Security Appliance y 5500 Series Adaptive Security Appliance (ASA) de Cisco anterior a las versiones 7.2 (3) 6 y 8.0 (3), cuando la función de decremento de Time-to-Live (TTL) está habilitada, permite que los atacantes remotos causen una denegación de servicio (recarga del dispositivo) por medio de un paquete IP creado. • http://secunia.com/advisories/28625 http://www.cisco.com/warp/public/707/cisco-sa-20080123-asa.shtml http://www.securityfocus.com/bid/27418 http://www.securitytracker.com/id?1019262 http://www.securitytracker.com/id?1019263 http://www.vupen.com/english/advisories/2008/0259 https://exchange.xforce.ibmcloud.com/vulnerabilities/39862 •