Page 4 of 52 results (0.001 seconds)

CVSS: 7.5EPSS: 1%CPEs: 16EXPL: 0

28 Oct 2016 — A vulnerability in Advanced Malware Protection (AMP) for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition due to the AMP process unexpectedly restarting. Affected Products: Cisco AsyncOS Software for Email Security Appliances (ESA) versions 9.5 and later up to the first fixed release, Cisco AsyncOS Software for Web Security Appliances (WSA) all versions prior to the first fixed release... • http://www.securityfocus.com/bid/93910 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 77EXPL: 0

28 Oct 2016 — A vulnerability in the email message and content filtering for malformed Multipurpose Internet Mail Extensions (MIME) headers of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of the targeted device. Emails that should have been quarantined could instead be processed. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco Asyn... • http://www.securityfocus.com/bid/93911 • CWE-20: Improper Input Validation •

CVSS: 5.9EPSS: 0%CPEs: 21EXPL: 0

05 Oct 2016 — The FTP service in Cisco AsyncOS on Email Security Appliance (ESA) devices 9.6.0-000 through 9.9.6-026, Web Security Appliance (WSA) devices 9.0.0-162 through 9.5.0-444, and Content Security Management Appliance (SMA) devices allows remote attackers to cause a denial of service via a flood of FTP traffic, aka Bug IDs CSCuz82907, CSCuz84330, and CSCuz86065. El servicio FTP en Cisco AsyncOS en dispositivos Email Security Appliance (ESA) 9.6.0-000 hasta la versión 9.9.6-026, dispositivos Web Security Appliance... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-aos • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 1%CPEs: 41EXPL: 0

17 Sep 2016 — Cisco AsyncOS through 9.5.0-444 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (link saturation) by making many HTTP requests for overlapping byte ranges simultaneously, aka Bug ID CSCuz27219. Cisco AsyncOS hasta la versión 9.5.0-444 en dispositivos Web Security Appliance (WSA) permite a atacantes remotos provocar una denegación de servicio (saturación de enlace) haciendo muchas peticiones HTTP para el solapamiento de rangos de byte simultáneamente, vulnerabilid... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-wsa • CWE-399: Resource Management Errors •

CVSS: 5.3EPSS: 0%CPEs: 37EXPL: 0

02 Jul 2016 — The proxy process on Cisco Web Security Appliance (WSA) devices through 9.1.0-070 allows remote attackers to cause a denial of service (CPU consumption) by establishing an FTP session and then improperly terminating the control connection after a file transfer, aka Bug ID CSCuy43468. El proceso proxy en dispositivos Cisco Web Security Appliance (WSA) hasta la versión 9.1.0-070 permite a atacantes remotos causar una denegación de servicios (consumo de CPU) estableciendo una sesión FTP y entonces terminando i... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160627-wsa • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 8%CPEs: 5EXPL: 0

08 Jun 2016 — libclamav in ClamAV (aka Clam AntiVirus), as used in Advanced Malware Protection (AMP) on Cisco Email Security Appliance (ESA) devices before 9.7.0-125 and Web Security Appliance (WSA) devices before 9.0.1-135 and 9.1.x before 9.1.1-041, allows remote attackers to cause a denial of service (AMP process restart) via a crafted document, aka Bug IDs CSCuv78533 and CSCuw60503. libclamav en ClamAV (también conocida como Clam AntiVirus), tal como se utiliza en Advanced Malware Protection (AMP) en dispositivos Cis... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160531-wsa-esa • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

25 May 2016 — Cisco AsyncOS 8.0 before 8.0.6-119 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (proxy-process hang) via a crafted HTTP POST request, aka Bug ID CSCuo12171. Cisco AsyncOS 8.0 en versiones anteriores a 8.0.6-119 en dispositivos Web Security Appliance (WSA) permite a atacantes remotos provocar una denegación de servicio (colgado del proceso proxy) a través de una petición HTTP POST manipulada, también conocida como Bug ID CSCuo12171. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa1 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 0

25 May 2016 — Memory leak in Cisco AsyncOS 8.5 through 9.0 before 9.0.1-162 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via an HTTP file-range request for cached content, aka Bug ID CSCuw97270. Fuga de memoria en Cisco AsyncOS 8.5 hasta la versión 9.0 en versiones anteriores a 9.0.1-162 en dispositivos Web Security Appliance (WSA) permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) a través de una petición HTTP file-ran... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa2 • CWE-399: Resource Management Errors •

CVSS: 5.3EPSS: 1%CPEs: 2EXPL: 0

03 Mar 2016 — The HTTPS Proxy feature in Cisco AsyncOS before 8.5.3-051 and 9.x before 9.0.0-485 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (service outage) by leveraging certain intranet connectivity and sending a malformed HTTPS request, aka Bug ID CSCuu24840. La funcionalidad de HTTPS Proxy en Cisco AsyncOS en versiones anteriores a 8.5.3-051 y 9.x en versiones anteriores a 9.0.0-485 en dispositivos Web Security Appliance (WSA) permite a atancantes remotos causar una d... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-wsa • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

20 Jan 2016 — The proxy engine on Cisco Web Security Appliance (WSA) devices with software 8.5.3-055, 9.1.0-000, and 9.5.0-235 allows remote attackers to bypass intended proxy restrictions via a malformed HTTP method, aka Bug ID CSCux00848. El motor de proxy en dispositivos Cisco Web Security Appliance (WSA) con software 8.5.3-055, 9.1.0-000 y 9.5.0-235 permite a atacantes remotos eludir las restricciones destinadas al proxy a través de un método HTTP mal formado, también conocido como Bug ID CSCux00848. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160119-wsa • CWE-254: 7PK - Security Features •