Page 7 of 87 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 114EXPL: 0

13 Nov 2013 — The phone-proxy implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0.3.6 and earlier does not properly validate X.509 certificates, which allows remote attackers to cause a denial of service (connection-database corruption) via an invalid entry, aka Bug ID CSCui33299. La implementación phone-proxy en Cisco Adaptive Security Appliance (ASA) Software 9.0.3.6 y anteriores versiones no valida adecuadamente certificados X.509, lo que permite a atacantes remotos provocar una denegación de servic... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6682 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 118EXPL: 0

13 Nov 2013 — The IPv6 implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1.3 and earlier, when NAT64 or NAT66 is enabled, does not properly process NAT rules, which allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCue34342. La implementación IPv6 en Cisco Adaptive Security Appliance (ASA) Software 9.1.3 y anteriores versiones, cuando NAT64 o NAT66 están activados, no procesan adecuadamente reglas NAT, lo que permite a atacantes remotos provocar una ... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5560 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 114EXPL: 0

13 Nov 2013 — The auto-update implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0.3.6 and earlier allows remote attackers to cause a denial of service (device reload) via crafted update data, aka Bug ID CSCui33308. La implementación auto-update en Cisco Adaptive Security Appliance (ASA) Software 9.0.3.6 y anteriores versiones permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) a través de datos de actualización manipulados, también conocido como Bug ID CSCui33308. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5568 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 1%CPEs: 63EXPL: 0

25 Feb 2011 — Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.12), 7.1 and 7.2 before 7.2(5.2), 8.0 before 8.0(5.21), 8.1 before 8.1(2.49), 8.2 before 8.2(3.6), and 8.3 before 8.3(2.7) and Cisco PIX Security Appliances 500 series devices, when transparent firewall mode is configured but IPv6 is not configured, allow remote attackers to cause a denial of service (packet buffer exhaustion and device outage) via IPv6 traffic, aka Bug ID CSCtj04707. Dispositivos de la serie Cisco A... • http://secunia.com/advisories/43488 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 2%CPEs: 95EXPL: 0

25 Feb 2011 — Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (S... • http://secunia.com/advisories/43453 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 1%CPEs: 62EXPL: 0

07 Jan 2011 — Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) allows remote attackers to cause a denial of service (device crash) by making many SIP calls, aka Bug ID CSCte20030. Vulnerabilidad no especificada en la función de inspección de SIP en dispositivos Cisco Adaptive Security Appliances (ASA) serie 5500 con software anterior a v8.3 (2) permite a atacantes remotos causar una denegación de servicio (caída del disposi... • http://secunia.com/advisories/42931 •

CVSS: 9.1EPSS: 0%CPEs: 62EXPL: 0

07 Jan 2011 — Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) do not properly preserve ACL behavior after a migration, which allows remote attackers to bypass intended access restrictions via an unspecified type of network traffic that had previously been denied, aka Bug ID CSCte46460. Dispositivos Cisco Adaptive Security Appliances (ASA) serie 5500 con software anterior a v8.3 (2) no previene de forma adecuada el comportamiento de las listas de control de acceso ACL después de un... • http://www.cisco.com/en/US/docs/security/asa/asa83/release/notes/asarn83.pdf • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 62EXPL: 0

07 Jan 2011 — The Mobile User Security (MUS) service on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) does not properly authenticate HTTP requests from a Web Security appliance (WSA), which might allow remote attackers to obtain sensitive information via a HEAD request, aka Bug ID CSCte53635. El servicio Mobile User Segurity (MUS) en dispositivos Cisco Adaptive Security Appliances (ASA) series 5500 con software anterior a v8.3 (2) no autentican correctamente a las peticiones HTT... • http://secunia.com/advisories/42931 • CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 1%CPEs: 62EXPL: 0

07 Jan 2011 — Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) allows remote attackers to cause a denial of service (device crash) via multicast traffic, aka Bug IDs CSCtg61810 and CSCtg69742. Vulnerabilidad no especificada en dispositivos Cisco Adaptive Security Appliances (ASA) serie 5500 con software anteriore a v8.3 (2) permite a atacantes remotos provocar una denegación de servicio (caída del dispositivo) a través del tráfico multicast, también con... • http://secunia.com/advisories/42931 •

CVSS: 7.8EPSS: 1%CPEs: 62EXPL: 0

07 Jan 2011 — Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) allows remote attackers to cause a denial of service (device crash) via a large number of LAN-to-LAN (aka L2L) IPsec sessions, aka Bug ID CSCth36592. Vulnerabilidad no especifica en dispositivos Cisco Adaptive Security Appliances (ASA) de las serie 5500 con software anterior a la v8.3 (2) permite a atacantes remotos causar una denegación de servicio (caída del dispositivo) a través de un núm... • http://secunia.com/advisories/42931 •