Page 4 of 30 results (0.011 seconds)

CVSS: 7.8EPSS: 2%CPEs: 10EXPL: 0

Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 Series devices 7.0 before 7.0(8)6, 7.1 before 7.1(2)82, 7.2 before 7.2(4)26, 8.0 before 8.0(4)24, and 8.1 before 8.1(2)14, when H.323 inspection is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted H.323 packet. Vulnerabilidad no específica en Cisco Adaptive Security Appliances (ASA) 5500 Series dispositivos v7.0 anteriores a v7.0(8)6, v7.1 anteriores a v7.1(2)82, v7.2 anteriores a v7.2(4)26, v8.0 anteriores a v8.0(4)24, y v8.1 anteriores a v8.1(2)14, cuando la inspección H.323 está habilitado, permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de un paquete h.323 manipulado. • http://osvdb.org/53444 http://secunia.com/advisories/34607 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a994f6.shtml http://www.securityfocus.com/bid/34429 http://www.securitytracker.com/id?1022015 http://www.vupen.com/english/advisories/2009/0981 •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 0

Unspecified vulnerability in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.0 before 7.0(8)3, 7.1 before 7.1(2)78, 7.2 before 7.2(4)16, 8.0 before 8.0(4)6, and 8.1 before 8.1(1)13, when configured as a VPN using Microsoft Windows NT Domain authentication, allows remote attackers to bypass VPN authentication via unknown vectors. Vulnerabilidad no especificada en Cisco Adaptive Security Appliances (ASA) 5500 Series y PIX Security Appliances 7.0 versiones anteriores a 7.0(8)3, 7.1 versiones anteriores a 7.1(2)78, 7.2 versiones anteriores a 7.2(4)16, 8.0 versiones anteriores a 8.0(4)6, y 8.1 versiones anteriores a 8.1(1)13, cuando está configurado como una VPN utilizando la autenticación del dominio de Microsoft Windows NT, permite a atacantes remotos evitar la autenticación VPN a través de vectores desconocidos. • http://secunia.com/advisories/32360 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a183ba.shtml http://www.securityfocus.com/bid/31864 http://www.securitytracker.com/id?1021089 http://www.securitytracker.com/id?1021090 http://www.vupen.com/english/advisories/2008/2899 https://exchange.xforce.ibmcloud.com/vulnerabilities/46024 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5983 • CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 2%CPEs: 6EXPL: 0

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.1.x before 7.1(2)70, 7.2.x before 7.2(4), and 8.0.x before 8.0(3)10 allows remote attackers to cause a denial of service via a crafted TCP ACK packet to the device interface. Adaptive Security Appliance (ASA) de Cisco y PIX security appliance de Cisco versión 7.1.x anterior a 7.1(2)70, versión 7.2.x anterior a 7.2 (4) y versión 8.0.x anterior a 8.0(3)10, permite a los atacantes remotos causar una denegación de servicio por medio de un paquete TCP ACK creado para la interfaz del dispositivo. • http://secunia.com/advisories/30552 http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml http://www.securitytracker.com/id?1020176 http://www.securitytracker.com/id?1020177 http://www.vupen.com/english/advisories/2008/1750/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42835 • CWE-20: Improper Input Validation •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

The Cisco PIX/ASA Finesse Operation System 7.1 and 7.2 allows local users to gain privileges by entering characters at the enable prompt, erasing these characters via the Backspace key, and then holding down the Backspace key for one second after erasing the final character. NOTE: third parties, including one who works for the vendor, have been unable to reproduce the flaw unless the enable password is blank ** DISPUTADA ** Cisco PIX/ASA Finesse Operation System 7.1 y 7.2 permite a usuarios locales ganar privilegios mediante la introducción de caracteres en el intérprete de comandos, borrando estos caracteres a través de la tecla de retroceso (Backspace) y posteriormente manteniendo pulsada la tecla de retroceso durante un segundo después de borrar el último caracter. NOTA: terceras partes, incluyendo una que trabaja para el proveedor, no han podido reproducir el fallo a no ser que la contraseña de habilitar esté en blanco. • http://hackathology.blogspot.com/2008/01/pixasa-finesse-71-72-privilege.html http://www.gnucitizen.org/projects/router-hacking-challenge http://www.securityfocus.com/archive/1/486938 http://www.securityfocus.com/archive/1/486959 http://www.securityfocus.com/archive/1/487051 http://www.securityfocus.com/archive/1/487579 http://www.securityfocus.com/archive/1/489009/100/0/threaded http://www.securityfocus.com/bid/27457 https://exchange.xforce.ibmcloud.com/vulnerabilities/41129 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.1EPSS: 2%CPEs: 4EXPL: 0

Cisco PIX and ASA appliances with 7.1 and 7.2 software, when configured for TLS sessions to the device, allow remote attackers to cause a denial of service (device reload) via a crafted TLS packet, aka CSCsg43276 and CSCsh97120. Cisco PIX y ASA appliances con software 7.1 y 7.2, cuando se configura para sesiones TLS en el dispositivo, permite a atacantes remotos provocar denegación de servicio (recarga de dispositivo) a través de paquetes TLS manipulados, también conocido como CSCsg43276 y CSCsh97120. • http://secunia.com/advisories/27193 http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda56.shtml http://www.securityfocus.com/bid/26104 http://www.securitytracker.com/id?1018826 http://www.securitytracker.com/id?1018827 http://www.vupen.com/english/advisories/2007/3531 https://exchange.xforce.ibmcloud.com/vulnerabilities/37260 • CWE-20: Improper Input Validation •