Page 4 of 21 results (0.012 seconds)

CVSS: 7.8EPSS: 2%CPEs: 10EXPL: 0

Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 Series devices 7.0 before 7.0(8)6, 7.1 before 7.1(2)82, 7.2 before 7.2(4)26, 8.0 before 8.0(4)24, and 8.1 before 8.1(2)14, when H.323 inspection is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted H.323 packet. Vulnerabilidad no específica en Cisco Adaptive Security Appliances (ASA) 5500 Series dispositivos v7.0 anteriores a v7.0(8)6, v7.1 anteriores a v7.1(2)82, v7.2 anteriores a v7.2(4)26, v8.0 anteriores a v8.0(4)24, y v8.1 anteriores a v8.1(2)14, cuando la inspección H.323 está habilitado, permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de un paquete h.323 manipulado. • http://osvdb.org/53444 http://secunia.com/advisories/34607 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a994f6.shtml http://www.securityfocus.com/bid/34429 http://www.securitytracker.com/id?1022015 http://www.vupen.com/english/advisories/2009/0981 •

CVSS: 5.7EPSS: 1%CPEs: 4EXPL: 0

Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 Series devices 8.0 before 8.0(4)25 and 8.1 before 8.1(2)15, when an SSL VPN or ASDM access is configured, allows remote attackers to cause a denial of service (device reload) via a crafted (1) SSL or (2) HTTP packet. Vulnerabilidad no específica en Cisco Adaptive Security Appliances (ASA) 5500 Series devices v8.0 anteriores a v8.0(4)25 y v8.1 anteriores a v8.1(2)15, cuando está configurado el acceso SSL VPN o ASDM, permite a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) a través de un paquete manipulado (1) SSL o (2) HTTP. • http://osvdb.org/53442 http://secunia.com/advisories/34607 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a994f6.shtml http://www.securityfocus.com/bid/34429 http://www.securitytracker.com/id?1022015 http://www.vupen.com/english/advisories/2009/0981 •

CVSS: 7.8EPSS: 2%CPEs: 3EXPL: 0

Memory leak in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 8.0 before 8.0(4) and 8.1 before 8.1(2) allows remote attackers to cause a denial of service (memory consumption) via an unspecified sequence of packets, related to the "initialization code for the hardware crypto accelerator." Fuga de memoria en Cisco Adaptive Security Appliances (ASA) 5500 Series y PIX Security Appliances 8.0 antes de 8.0(4) y 8.1 antes de 8.1(2) permite a atacantes remotos provocar una denegación de servicio (agotamiento de memoria) mediante una secuencia no especificada de paquetes, relacionada con "código de inicialización para el acelerador de hardware criptológico". • http://secunia.com/advisories/32392 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a183ba.shtml http://www.securityfocus.com/bid/31865 http://www.securitytracker.com/id?1021088 http://www.vupen.com/english/advisories/2008/2899 https://exchange.xforce.ibmcloud.com/vulnerabilities/46027 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5597 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 2%CPEs: 6EXPL: 0

Multiple unspecified vulnerabilities in the SIP inspection functionality in Cisco PIX and Adaptive Security Appliance (ASA) 5500 devices 7.0 before 7.0(7)16, 7.1 before 7.1(2)71, 7.2 before 7.2(4)7, 8.0 before 8.0(3)20, and 8.1 before 8.1(1)8 allow remote attackers to cause a denial of service (device reload) via unknown vectors, aka Bug IDs CSCsq07867, CSCsq57091, CSCsk60581, and CSCsq39315. Múltiples vulnerabilidades no especificadas en la funcionalidad de inspección SIP en Cisco PIX y Adaptive Security Appliance (ASA) 5500 devices 7.0 versiones anteriores a 7.0(7)16, 7.1 versiones anteriores a 7.1(2)71, 7.2 versiones anteriores a 7.2(4)7, 8.0 versiones anteriores a 8.0(3)20, y 8.1 versiones anteriores a 8.1(1)8 permiten a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de vectores no especificados, también conocido como Bug IDs CSCsq07867, CSCsq57091, CSCsk60581, y CSCsq39315. • http://secunia.com/advisories/31730 http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml http://www.securityfocus.com/bid/30998 http://www.securitytracker.com/id?1020808 http://www.securitytracker.com/id?1020809 https://exchange.xforce.ibmcloud.com/vulnerabilities/44866 •

CVSS: 7.1EPSS: 2%CPEs: 6EXPL: 0

Cisco PIX and Adaptive Security Appliance (ASA) 5500 devices 7.2 before 7.2(4)2, 8.0 before 8.0(3)14, and 8.1 before 8.1(1)4, when configured as a client VPN endpoint, do not properly process IPSec client authentication, which allows remote attackers to cause a denial of service (device reload) via a crafted authentication attempt, aka Bug ID CSCso69942. Cisco PIX y dispositivos Adaptive Security Appliance 5500(ASA) 7.2 anteriores a 7.2(4)2, 8.0 anterior a 8.0(3)14, y 8.1 anterior a 8.1(1)4, cuando se encuentra configurado como un endpoint VPN, no procesa adecuadamente la autenticación cliente, lo que permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) a través de un intento de autenticación manipulado, también conocido como Bug ID CSCso69942. • http://secunia.com/advisories/31730 http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml http://www.securityfocus.com/bid/30998 http://www.securitytracker.com/id?1020810 http://www.securitytracker.com/id?1020811 https://exchange.xforce.ibmcloud.com/vulnerabilities/44867 •