Page 26 of 143 results (0.006 seconds)

CVSS: 7.8EPSS: 2%CPEs: 6EXPL: 0

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.1.x before 7.1(2)70, 7.2.x before 7.2(4), and 8.0.x before 8.0(3)10 allows remote attackers to cause a denial of service via a crafted TCP ACK packet to the device interface. Adaptive Security Appliance (ASA) de Cisco y PIX security appliance de Cisco versión 7.1.x anterior a 7.1(2)70, versión 7.2.x anterior a 7.2 (4) y versión 8.0.x anterior a 8.0(3)10, permite a los atacantes remotos causar una denegación de servicio por medio de un paquete TCP ACK creado para la interfaz del dispositivo. • http://secunia.com/advisories/30552 http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml http://www.securitytracker.com/id?1020176 http://www.securitytracker.com/id?1020177 http://www.vupen.com/english/advisories/2008/1750/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42835 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 2%CPEs: 4EXPL: 0

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 8.0.x before 8.0(3)9 and 8.1.x before 8.1(1)1 allows remote attackers to cause a denial of service (device reload) via a crafted Transport Layer Security (TLS) packet to the device interface. Cisco Adaptive Security Appliance (ASA) y Cisco PIX security appliance 8.0.x anterior a 8.0(3)9 y 8.1.x anterior a 8.1(1)1, permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) a través de un paquete Transport Layer Security (TLS)manipulado a la interfaz del dispositivo. • http://secunia.com/advisories/30552 http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml http://www.securitytracker.com/id?1020178 http://www.securitytracker.com/id?1020179 http://www.vupen.com/english/advisories/2008/1750/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42836 • CWE-20: Improper Input Validation •

CVSS: 5.4EPSS: 2%CPEs: 4EXPL: 0

The Instant Messenger (IM) inspection engine in Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.2.x before 7.2(4), 8.0.x before 8.0(3)10, and 8.1.x before 8.1(1)2 allows remote attackers to cause a denial of service via a crafted packet. Motor de inspección Instant Messenger en Cisco Adaptive Security Appliance ASA) y Cisco PIX security appliance 7.2.x anterior 7.2(4), 8.0.x anterior a 8.0(3)10, y 8.1.x anterior a 8.1(1)2, permite a atacantes remotos provocar una denegación de servicio a trasvés de un paquete manipulado. • http://secunia.com/advisories/30552 http://securitytracker.com/id?1020180 http://securitytracker.com/id?1020181 http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml http://www.vupen.com/english/advisories/2008/1750/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42837 •

CVSS: 7.8EPSS: 1%CPEs: 4EXPL: 0

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.2.x before 7.2(3)2 and 8.0.x before 8.0(2)17 allows remote attackers to cause a denial of service (device reload) via a port scan against TCP port 443 on the device. Cisco Adaptive Security Appliance (ASA) y Cisco PIX security appliance 7.2.x anterior a 7.2(3)2 y v8.0.x anterior a 8.0(2)17, permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) mediante un escaneo de puerto hacia el 443. • http://secunia.com/advisories/30552 http://securitytracker.com/id?1020182 http://securitytracker.com/id?1020183 http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml http://www.vupen.com/english/advisories/2008/1750/references • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 8.0.x before 8.0(3)9 allows remote attackers to bypass control-plane ACLs for the device via unknown vectors. Cisco Adaptive Security Appliance (ASA) y Cisco PIX security appliance 8.0.x anterior a 8.0(3)9, permite a atacantes remotos evitar las ACLs del plano de control a través de vectores desconocidos. • http://secunia.com/advisories/30552 http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml http://www.securitytracker.com/id?1020184 http://www.securitytracker.com/id?1020185 http://www.vupen.com/english/advisories/2008/1750/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42841 • CWE-264: Permissions, Privileges, and Access Controls •