Page 4 of 40 results (0.011 seconds)

CVSS: 7.8EPSS: 2%CPEs: 6EXPL: 0

Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.2 before 7.2(4.46), 8.0 before 8.0(4.38), 8.1 before 8.1(2.29), and 8.2 before 8.2(1.5); and Cisco PIX 500 Series Security Appliance; allows remote attackers to cause a denial of service (prevention of new connections) via crafted TCP segments during termination of the TCP connection that cause the connection to remain in CLOSEWAIT status, aka "TCP Connection Exhaustion Denial of Service Vulnerability." Vulnerabilidad no especificada en Cisco ASA 5500 Series Adaptive Security Appliance v7.2 anterior a v7.2(4.46), v8.0 anterior a v8.0(4.38), 8.1 anterior a v8.1(2.29), y v8.2 anterior a v8.2(1.15) y Cisco PIX 500 Series Security Appliance, permite a atacantes remotos causar una denegación de servicio (prevención de nuevas conexiones), mediante segmentos TCP manipulados durante la terminación de la conexión TCP que provoca que la conexión permanezca en estado de CLOSEWAIT, tambien conocido como "Vulnerabilidad de Denegación de Servicio por Agotamiento de Conexiones TCP". • http://osvdb.org/62433 http://secunia.com/advisories/38618 http://secunia.com/advisories/38636 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml http://www.securityfocus.com/bid/38275 http://www.securitytracker.com/id?1023612 http://www.vupen.com/english/advisories/2010/0415 https://exchange.xforce.ibmcloud.com/vulnerabilities/56336 •

CVSS: 7.1EPSS: 2%CPEs: 6EXPL: 0

Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 before 7.0(8.10), 7.2 before 7.2(4.45), 8.0 before 8.0(4.44), 8.1 before 8.1(2.35), and 8.2 before 8.2(1.10) allows remote attackers to cause a denial of service (device reload) via a malformed TCP segment when certain NAT translation and Cisco AIP-SSM configurations are used, aka Bug ID CSCtb37219. Vulnerabilidad no especificada en Cisco ASA 5500 Series Adaptive Security Appliance v7.0 anterior a v7.0(8.10), v7.2 anterior a v7.2(4.45), v8.0 anterior a v8.0(4.44), 8.1 anterior a v8.1(2.35), y v8.2 anterior a v8.2(1.10) permite a atacantes remotos causar una denegación de servicio (reinicio del dispositivo) mediante un segmento TCP incorrecto cuando se utilizan una traducción NAT determinada y las configuraciones de Cisco AIP-SSM, también conocido como Bug ID CSCtb37219. • http://osvdb.org/62431 http://secunia.com/advisories/38618 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml http://www.securityfocus.com/bid/38278 http://www.securitytracker.com/id?1023612 http://www.vupen.com/english/advisories/2010/0415 https://exchange.xforce.ibmcloud.com/vulnerabilities/56340 •

CVSS: 7.8EPSS: 2%CPEs: 6EXPL: 0

Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 before 7.0(8.10), 7.2 before 7.2(4.45), 8.0 before 8.0(5.2), 8.1 before 8.1(2.37), and 8.2 before 8.2(1.16); and Cisco PIX 500 Series Security Appliance; allows remote attackers to cause a denial of service (device reload) via malformed SIP messages, aka Bug ID CSCsy91157. Vulnerabilidad no especificada en Cisco ASA 5500 Series Adaptive Security Appliance v7.0 anterior a v7.0(8.10), v7.2 anterior a v7.2(4.45), v8.0 anterior a v8.0(5.2), 8.1 anterior a v8.1(2.37), y v8.2 anterior a v8.2(1.16) y Cisco PIX 500 Series Security Appliance, permite a atacantes remotos causar una denegación de servicio (reinicio del dispositivo) a través de mensajes SIP con formato incorrecto, también conocido como Bug ID CSCsy91157. • http://osvdb.org/62434 http://secunia.com/advisories/38618 http://secunia.com/advisories/38636 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml http://www.securityfocus.com/bid/38277 http://www.securitytracker.com/id?1023612 http://www.vupen.com/english/advisories/2010/0415 https://exchange.xforce.ibmcloud.com/vulnerabilities/56338 •

CVSS: 5.0EPSS: 2%CPEs: 6EXPL: 0

Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 before 7.0(8.10), 7.2 before 7.2(4.45), 8.0 before 8.0(5.1), 8.1 before 8.1(2.37), and 8.2 before 8.2(1.15); and Cisco PIX 500 Series Security Appliance; allows remote attackers to cause a denial of service (active IPsec tunnel loss and prevention of new tunnels) via a malformed IKE message through an existing tunnel to UDP port 4500, aka Bug ID CSCtc47782. Vulnerabilidad no especificada en Cisco ASA 5500 Series Adaptive Security Appliance v7.0 anterior a v7.0(8.10), v7.2 anterior a v7.2(4.45), v8.0 anterior a v8.0(5.1), 8.1 anterior a v8.1(2.37), y v8.2 anterior a v8.2(1.15), y Cisco PIX 500 Series Security Appliance, permite a atacantes remotos provocar una denegación de servicio (pérdida del túnel IPsec activo y la prevención de nuevos túneles) mediante un mensaje IKE malformado a través de un túnel existente en el puerto UDP 4500, también conocido como Bug ID CSCtc47782. • http://osvdb.org/62436 http://secunia.com/advisories/38618 http://secunia.com/advisories/38636 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml http://www.securityfocus.com/bid/38279 http://www.securitytracker.com/id?1023612 http://www.vupen.com/english/advisories/2010/0415 https://exchange.xforce.ibmcloud.com/vulnerabilities/56341 •

CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 0

Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 before 7.0(8.10), 7.2 before 7.2(4.45), 8.0 before 8.0(5.7), 8.1 before 8.1(2.40), and 8.2 before 8.2(2.1); and Cisco PIX 500 Series Security Appliance; allows remote attackers to bypass NTLMv1 authentication via a crafted username, aka Bug ID CSCte21953. Vulnerabilidad no especificada en Cisco ASA 5500 Series Adaptive Security Appliance v7.0 anterior a v7.0(8.10), v7.2 anterior a v7.2(4.45), v8.0 anterior a v8.0(5.2), 8.1 anterior a v8.1(2.40), y v8.2 anterior a v8.2(2.1), y Cisco PIX 500 Series Security Appliance, permite a atacantes remotos evitar la autenticación a través de un nombre de usuario NTLMv1 manipulado, también conocido como Bug ID CSCte21953. • http://osvdb.org/62437 http://secunia.com/advisories/38618 http://secunia.com/advisories/38636 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml http://www.securityfocus.com/bid/38279 http://www.securitytracker.com/id?1023612 http://www.vupen.com/english/advisories/2010/0415 https://exchange.xforce.ibmcloud.com/vulnerabilities/56342 •