
CVE-2016-1287 – Cisco ASA Software 8.x/9.x - IKEv1 / IKEv2 Buffer Overflow
https://notcve.org/view.php?id=CVE-2016-1287
11 Feb 2016 — Buffer overflow in the IKEv1 and IKEv2 implementations in Cisco ASA Software before 8.4(7.30), 8.7 before 8.7(1.18), 9.0 before 9.0(4.38), 9.1 before 9.1(7), 9.2 before 9.2(4.5), 9.3 before 9.3(3.7), 9.4 before 9.4(2.4), and 9.5 before 9.5(2.2) on ASA 5500 devices, ASA 5500-X devices, ASA Services Module for Cisco Catalyst 6500 and Cisco 7600 devices, ASA 1000V devices, Adaptive Security Virtual Appliance (aka ASAv), Firepower 9300 ASA Security Module, and ISA 3000 devices allows remote attackers to execute... • https://packetstorm.news/files/id/137100 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2015-6423
https://notcve.org/view.php?id=CVE-2015-6423
15 Jan 2016 — The DCERPC Inspection implementation in Cisco Adaptive Security Appliance (ASA) Software 9.4.1 through 9.5.1 allows remote authenticated users to bypass an intended DCERPC-only ACL by sending arbitrary network traffic, aka Bug ID CSCuu67782. La implementación DCERPC Inspection en Cisco Adaptive Security Appliance (ASA) Software 9.4.1 hasta la versión 9.5.1 permite a usuarios remotos autenticados eludir una ACL destinada a DCERPC-only mediante el envío de tráfico de red arbitrario, también conocido como Bug ... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160111-asa • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2015-4239
https://notcve.org/view.php?id=CVE-2015-4239
03 Jul 2015 — Cisco Adaptive Security Appliance (ASA) Software 9.3(2.243) and 100.13(0.21) allows remote attackers to cause a denial of service (device reload) by sending crafted OSPFv2 packets on the local network, aka Bug ID CSCus84220. Cisco Adaptive Security Appliance (ASA) Software 9.3(2.243) y 100.13(0.21) permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) mediante el envío de paquetes OSPFv2 manipulados en la red local, también conocido como Bug ID CSCus84220. • http://tools.cisco.com/security/center/viewAlert.x?alertId=39612 • CWE-399: Resource Management Errors •

CVE-2015-0742
https://notcve.org/view.php?id=CVE-2015-0742
21 May 2015 — The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registration, which allows remote attackers to cause a denial of service (forwarding outage) via a crafted multicast packet, aka Bug ID CSCus74398. La aplicación Protocol Independent Multicast (PIM) en el software Cisco Ad... • http://tools.cisco.com/security/center/viewAlert.x?alertId=38937 • CWE-399: Resource Management Errors •