
CVE-2014-8023
https://notcve.org/view.php?id=CVE-2014-8023
17 Feb 2015 — Cisco Adaptive Security Appliance (ASA) Software 9.2(.3) and earlier, when challenge-response authentication is used, does not properly select tunnel groups, which allows remote authenticated users to bypass intended resource-access restrictions via a crafted tunnel-group parameter, aka Bug ID CSCtz48533. Cisco Adaptive Security Appliance (ASA) Software 9.2(.3) y anteriores, cuando la autenticación de las respuestas de desafió está habilitada, no selecciona correctamente los grupos de túnel, lo que permite ... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8023 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-5557
https://notcve.org/view.php?id=CVE-2013-5557
07 Feb 2015 — The Proxy Bypass Content Rewriter feature in the WebVPN subsystem in Cisco Adaptive Security Appliance (ASA) Software 9.1(.2) and earlier allows remote authenticated users to cause a denial of service (device crash or error-recovery event) via an HTTP request that triggers a rewrite, aka Bug ID CSCug91577. La caracteristica Proxy Bypass Content Rewriter en el subsistema WebVPN en Cisco Adaptive Security Appliance (ASA) Software 9.1(.2) y anteriores permite a usuarios remotos autenticados causar una denegaci... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5557 •

CVE-2014-3407
https://notcve.org/view.php?id=CVE-2014-3407
28 Nov 2014 — The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(.2) and earlier does not properly allocate memory blocks during HTTP packet handling, which allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCuq68888. La implementación SSL VPN en Cisco Adaptive Security Appliance (ASA) Software 9.3(.2) y anteriores no designa debidamente los bloques de memoria durante el manejo de paquetes HTTP, lo que permite a atacantes remotos cau... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3407 • CWE-400: Uncontrolled Resource Consumption •

CVE-2014-3390
https://notcve.org/view.php?id=CVE-2014-3390
10 Oct 2014 — The Virtual Network Management Center (VNMC) policy implementation in Cisco ASA Software 8.7 before 8.7(1.14), 9.2 before 9.2(2.8), and 9.3 before 9.3(1.1) allows local users to obtain Linux root access by leveraging administrative privileges and executing a crafted script, aka Bug IDs CSCuq41510 and CSCuq47574. La implementación de política Virtual Network Management Center (VNMC) en Cisco ASA Software 8.7 anterior a 8.7(1.14), 9.2 anterior a 9.2(2.8), y 9.3 anterior a 9.3(1.1) permite a usuarios locales o... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa • CWE-20: Improper Input Validation •

CVE-2014-3392
https://notcve.org/view.php?id=CVE-2014-3392
10 Oct 2014 — The Clientless SSL VPN portal in Cisco ASA Software 8.2 before 8.2(5.51), 8.3 before 8.3(2.42), 8.4 before 8.4(7.23), 8.6 before 8.6(1.15), 9.0 before 9.0(4.24), 9.1 before 9.1(5.12), 9.2 before 9.2(2.8), and 9.3 before 9.3(1.1) allows remote attackers to obtain sensitive information from process memory or modify memory contents via crafted parameters, aka Bug ID CSCuq29136. El portal Clientless SSL VPN en Cisco ASA Software 8.2 anterior a 8.2(5.51), 8.3 anterior a 8.3(2.42), 8.4 anterior a 8.4(7.23), 8.6 a... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa •

CVE-2014-3393
https://notcve.org/view.php?id=CVE-2014-3393
10 Oct 2014 — The Clientless SSL VPN portal customization framework in Cisco ASA Software 8.2 before 8.2(5.51), 8.3 before 8.3(2.42), 8.4 before 8.4(7.23), 8.6 before 8.6(1.14), 9.0 before 9.0(4.24), 9.1 before 9.1(5.12), and 9.2 before 9.2(2.4) does not properly implement authentication, which allows remote attackers to modify RAMFS customization objects via unspecified vectors, as demonstrated by inserting XSS sequences or capturing credentials, aka Bug ID CSCup36829. El Framework de la personalización de portales Clie... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa • CWE-287: Improper Authentication •

CVE-2014-3394
https://notcve.org/view.php?id=CVE-2014-3394
10 Oct 2014 — The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(7.15), 8.6 before 8.6(1.14), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to bypass certificate validation via an arbitrary VeriSign certificate, aka Bug ID CSCun10916. La implementación Smart Call Home (SCH) en Cisco ASA Software 8.2 anterior a 8.2(5.50), 8.4 anterior a 8.4(7.15), 8.6 anterior a 8.6(1.14), 8.7 anterior a 8.7(1.13), 9.0 anterior a 9.0(4.8), y 9.1 ... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa • CWE-295: Improper Certificate Validation •

CVE-2014-3399
https://notcve.org/view.php?id=CVE-2014-3399
07 Oct 2014 — The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.2(.2.4) and earlier does not properly manage session information during creation of a SharePoint handler, which allows remote authenticated users to overwrite arbitrary RAMFS cache files or inject Lua programs, and consequently cause a denial of service (portal outage or system reload), via crafted HTTP requests, aka Bug ID CSCup54208. La implementación SSL VPN en el software Cisco Adaptive Security Appliance (ASA) 9.2(.2.4) y ... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3399 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2014-3264
https://notcve.org/view.php?id=CVE-2014-3264
20 May 2014 — Cisco Adaptive Security Appliance (ASA) Software 9.1(.5) and earlier allows remote authenticated users to cause a denial of service (device reload) via crafted attributes in a RADIUS packet, aka Bug ID CSCun69561. Cisco Adaptive Security Appliance (ASA) Software 9.1(.5) y anteriores permite a usuarios remotos autenticados causar una denegación de servicio (reinicio de dispositivo) a través de atributos manipulados en un paquete RADIUS, también conocido como Bug ID CSCun69561. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3264 •

CVE-2014-2126
https://notcve.org/view.php?id=CVE-2014-2126
10 Apr 2014 — Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47), 8.4 before 8.4(7.5), 8.7 before 8.7(1.11), 9.0 before 9.0(3.10), and 9.1 before 9.1(3.4) allows remote authenticated users to gain privileges by leveraging level-0 ASDM access, aka Bug ID CSCuj33496. Cisco Adaptive Security Appliance (ASA) Software 8.2 anterior a 8.2(5.47), 8.4 anterior a 8.4(7.5), 8.7 anterior a 8.7(1.11), 9.0 anterior a 9.0(3.10) y 9.1 anterior a 9.1(3.4) permite a usuarios remotos autenticados ganar privilegios median... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa • CWE-264: Permissions, Privileges, and Access Controls •