Page 3 of 31 results (0.008 seconds)

CVSS: 7.8EPSS: 2%CPEs: 2EXPL: 0

18 Oct 2007 — Cisco Firewall Services Module (FWSM) 3.2(1), and 3.1(5) and earlier, allows remote attackers to cause a denial of service (device reload) via a crafted HTTPS request, aka CSCsi77844. Cisco Firewall Services Module (FWSM) 3.2(1), y 3.1(5) y anteriores, permite a atacantes remotos provocar denegación de servicio (recarga de dispositivo) a través de una respuesta HTTPS manipulada, también conocido como CSCsi77844. • http://secunia.com/advisories/27236 • CWE-20: Improper Input Validation •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

18 Oct 2007 — Cisco Firewall Services Module (FWSM) 3.1(6), and 3.2(2) and earlier, does not properly enforce edited ACLs, which might allow remote attackers to bypass intended restrictions on network traffic, aka CSCsj52536. Cisco Firewall Services Module (FWSM) 3.1(6), y 3.2(2) y anteriores, no aplica correctamente la edición de ACLs, lo cual podría permitir a atacantes remotos evitar restricciones intencionadas sobre el tráfico de red, también conocido como CSCsj52536. • http://secunia.com/advisories/27236 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 2%CPEs: 6EXPL: 0

16 Feb 2007 — Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when "inspect http" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic. Cisco PIX 500 y ASA 5500 Series Security Appliances 7.x versiones anteriores a 7.0(4.14), 7.1 versiones anteriores a 7.1(2.1), y el FWSM 2.x versiones anteriores a 2.3(4.12) y 3.x versiones anteriores a 3.1(3.24), cuando "i... • http://osvdb.org/33055 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

16 Feb 2007 — Unspecified vulnerability in Cisco Firewall Services Module (FWSM) 3.x before 3.1(3.3), when set to log at the "debug" level, allows remote attackers to cause a denial of service (device reboot) by sending packets that are not of a particular protocol such as TCP or UDP, which triggers the reboot during generation of Syslog message 710006. Vulnerabilidad no especificada en Cisco Firewall Services Module (FWSM) 3.x versiones anteriores a 3.1(3.3), cuando está configurado para realizar trazas a nivel "debug",... • http://secunia.com/advisories/24172 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

16 Feb 2007 — Cisco FWSM 3.x before 3.1(3.18), when authentication is configured to use "aaa authentication match" or "aaa authentication include", allows remote attackers to cause a denial of service (device reboot) via a malformed HTTPS request. Cisco FWSM 3.x versiones anteriores a 3.1(3.18), cuando la autenticación esta configurada para usar "aaa authentication match" ó "aaa authentication include", permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) mediante peticiones HTTPS mal... • http://secunia.com/advisories/24172 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

16 Feb 2007 — Cisco FWSM 3.x before 3.1(3.2), when authentication is configured to use "aaa authentication match" or "aaa authentication include", allows remote attackers to cause a denial of service (device reboot) via a long HTTP request. Cisco FWSM 3.x versiones anteriores a 3.1(3.2), cuando la autenticación esta configurada para usar "aaa authentication match" ó "aaa authentication include", permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) mediante una petición HTTP larga. • http://secunia.com/advisories/24172 •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

16 Feb 2007 — Cisco Firewall Services Module (FWSM) 3.x before 3.1(3.11), when the HTTPS server is enabled, allows remote attackers to cause a denial of service (device reboot) via certain HTTPS traffic. Cisco Firewall Services Module (FWSM) 3.x versiones anteriores a 3.1(3.11), cuando el servidor HTTPS está habilitado, permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) mediante tráfico HTTPS concreto. • http://secunia.com/advisories/24172 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

16 Feb 2007 — Cisco Firewall Services Module (FWSM) 3.x before 3.1(3.1) allows remote attackers to cause a denial of service (device reboot) via malformed SNMP requests. Cisco Firewall Services Module (FWSM) 3.x versiones anteriores a 3.1(3.1) permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) mediante peticiones SNMP mal-formadas. • http://secunia.com/advisories/24172 •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

16 Feb 2007 — Unspecified vulnerability in Cisco Firewall Services Module (FWSM) before 2.3(4.7) and 3.x before 3.1(3.1) causes the access control entries (ACE) in an ACL to be improperly evaluated, which allows remote authenticated users to bypass intended certain ACL protections. Vulnerabilidad no especificada en Cisco Firewall Services Module (FWSM) versiones anteriores a 2.3(4.7) y 3.x versiones anteriores a 3.1(3.1) provoca que las entradas de control de acceso (ACE) en un ACL ser evaluadas inapropiadamente, lo cual... • http://secunia.com/advisories/24172 •

CVSS: 7.5EPSS: 4%CPEs: 66EXPL: 2

09 May 2006 — Cisco PIX/ASA 7.1.x before 7.1(2) and 7.0.x before 7.0(5), PIX 6.3.x before 6.3.5(112), and FWSM 2.3.x before 2.3(4) and 3.x before 3.1(7), when used with Websense/N2H2, allows remote attackers to bypass HTTP access restrictions by splitting the GET method of an HTTP request into multiple packets, which prevents the request from being sent to Websense for inspection, aka bugs CSCsc67612, CSCsc68472, and CSCsd81734. • https://www.exploit-db.com/exploits/27830 •