Page 3 of 43 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 23EXPL: 0

06 Aug 2010 — Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61662. Vulnerabilidad no especificada en la característica de inspección SunRPCen el módulo Cisco Firewall Services Module (FWSM) co... • http://secunia.com/advisories/40843 •

CVSS: 7.5EPSS: 0%CPEs: 18EXPL: 0

06 Aug 2010 — Unspecified vulnerability on the Cisco Firewall Services Module (FWSM) with software 3.2 before 3.2(17.2), 4.0 before 4.0(11.1), and 4.1 before 4.1(1.2) for Catalyst 6500 series switches and 7600 series routers, when multi-mode is enabled, allows remote attackers to cause a denial of service (device reload) via crafted (1) Telnet, (2) SSH, or (3) ASDM traffic over TCP, aka Bug ID CSCtg68694. Vulnerabilidad no especificada en en el módulo Cisco Firewall Services Module (FWSM) con software v3.2 anteriores a v... • http://secunia.com/advisories/40843 •

CVSS: 7.8EPSS: 1%CPEs: 13EXPL: 0

19 Feb 2010 — The Cisco Firewall Services Module (FWSM) 4.0 before 4.0(8), as used in for the Cisco Catalyst 6500 switches, Cisco 7600 routers, and ASA 5500 Adaptive Security Appliances, allows remote attackers to cause a denial of service (crash) via a malformed Skinny Client Control Protocol (SCCP) message. El Cisco Firewall Services Module (FWSM) v4.0 anterior a v4.0(8), que se utiliza en los switches Cisco Catalyst 6500, routers Cisco 7600 y ASA 5500 Adaptive Security Appliances, permite a atacantes remotos provocar ... • http://osvdb.org/62432 •

CVSS: 7.8EPSS: 1%CPEs: 16EXPL: 0

20 Aug 2009 — The Cisco Firewall Services Module (FWSM) 2.x, 3.1 before 3.1(16), 3.2 before 3.2(13), and 4.0 before 4.0(6) for Cisco Catalyst 6500 switches and Cisco 7600 routers allows remote attackers to cause a denial of service (traffic-handling outage) via a series of malformed ICMP messages. Cisco Firewall Services Module (FWSM) 2.x, 3.1 antes de 3.1(16), 3.2 antes de 3.2(13)y 4.0 antes de 4.0(6) para los switches Cisco Catalyst 6500 y los routers Cisco 7600 permite a atacantes remotos provocar una denegación de se... • http://secunia.com/advisories/36373 •

CVSS: 7.8EPSS: 1%CPEs: 3EXPL: 0

20 Dec 2007 — Unspecified vulnerability in Cisco Firewall Services Module (FWSM) 3.2(3) allows remote attackers to cause a denial of service (device reload) via crafted "data in the control-plane path with Layer 7 Application Inspections." Vulnerabilidad no especificada en Cisco Firewall Services Module (FWSM) 3.2(3) permite a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) mediante "datos manipulados en la ruta del plano de control con Inspecciones de Capa 7 de Applicación". • http://secunia.com/advisories/28175 •

CVSS: 7.5EPSS: 3%CPEs: 25EXPL: 0

18 Oct 2007 — Cisco PIX and ASA appliances with 7.0 through 8.0 software, and Cisco Firewall Services Module (FWSM) 3.1(5) and earlier, allow remote attackers to cause a denial of service (device reload) via a crafted MGCP packet, aka CSCsi90468 (appliance) and CSCsi00694 (FWSM). Cisco PIX y ASA appliances con software 7.0 hasta 8.0, y Cisco Firewall Services Module (FWSM) 3.1(5) y anteriores, permite a atacantes remotos provocar denegación de servicio (recarga de dispositivo) a través de un paquete manipulado MGCP, tamb... • http://secunia.com/advisories/27193 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 2%CPEs: 2EXPL: 0

18 Oct 2007 — Cisco Firewall Services Module (FWSM) 3.2(1), and 3.1(5) and earlier, allows remote attackers to cause a denial of service (device reload) via a crafted HTTPS request, aka CSCsi77844. Cisco Firewall Services Module (FWSM) 3.2(1), y 3.1(5) y anteriores, permite a atacantes remotos provocar denegación de servicio (recarga de dispositivo) a través de una respuesta HTTPS manipulada, también conocido como CSCsi77844. • http://secunia.com/advisories/27236 • CWE-20: Improper Input Validation •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

18 Oct 2007 — Cisco Firewall Services Module (FWSM) 3.1(6), and 3.2(2) and earlier, does not properly enforce edited ACLs, which might allow remote attackers to bypass intended restrictions on network traffic, aka CSCsj52536. Cisco Firewall Services Module (FWSM) 3.1(6), y 3.2(2) y anteriores, no aplica correctamente la edición de ACLs, lo cual podría permitir a atacantes remotos evitar restricciones intencionadas sobre el tráfico de red, también conocido como CSCsj52536. • http://secunia.com/advisories/27236 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 2%CPEs: 6EXPL: 0

16 Feb 2007 — Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when "inspect http" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic. Cisco PIX 500 y ASA 5500 Series Security Appliances 7.x versiones anteriores a 7.0(4.14), 7.1 versiones anteriores a 7.1(2.1), y el FWSM 2.x versiones anteriores a 2.3(4.12) y 3.x versiones anteriores a 3.1(3.24), cuando "i... • http://osvdb.org/33055 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

16 Feb 2007 — Unspecified vulnerability in Cisco Firewall Services Module (FWSM) 3.x before 3.1(3.3), when set to log at the "debug" level, allows remote attackers to cause a denial of service (device reboot) by sending packets that are not of a particular protocol such as TCP or UDP, which triggers the reboot during generation of Syslog message 710006. Vulnerabilidad no especificada en Cisco Firewall Services Module (FWSM) 3.x versiones anteriores a 3.1(3.3), cuando está configurado para realizar trazas a nivel "debug",... • http://secunia.com/advisories/24172 •