Page 7 of 95 results (0.046 seconds)

CVSS: 7.8EPSS: 0%CPEs: 77EXPL: 0

06 Oct 2011 — Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.2 before 7.2(5.3), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2), and 8.5 before 8.5(1.1) allow remote attackers to cause a denial of service (device reload) via crafted MSN Instant Messenger traffic, aka Bug ID CSCtl67486. Dispositivos de las series Cisco Adaptive Security Appliances (ASA ) 5500, y el mód... • http://osvdb.org/76091 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 1%CPEs: 63EXPL: 0

25 Feb 2011 — Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.12), 7.1 and 7.2 before 7.2(5.2), 8.0 before 8.0(5.21), 8.1 before 8.1(2.49), 8.2 before 8.2(3.6), and 8.3 before 8.3(2.7) and Cisco PIX Security Appliances 500 series devices, when transparent firewall mode is configured but IPv6 is not configured, allow remote attackers to cause a denial of service (packet buffer exhaustion and device outage) via IPv6 traffic, aka Bug ID CSCtj04707. Dispositivos de la serie Cisco A... • http://secunia.com/advisories/43488 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 2%CPEs: 95EXPL: 0

25 Feb 2011 — Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (S... • http://secunia.com/advisories/43453 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 1%CPEs: 62EXPL: 0

07 Jan 2011 — Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) allows remote attackers to cause a denial of service (device crash) by making many SIP calls, aka Bug ID CSCte20030. Vulnerabilidad no especificada en la función de inspección de SIP en dispositivos Cisco Adaptive Security Appliances (ASA) serie 5500 con software anterior a v8.3 (2) permite a atacantes remotos causar una denegación de servicio (caída del disposi... • http://secunia.com/advisories/42931 •

CVSS: 9.1EPSS: 0%CPEs: 62EXPL: 0

07 Jan 2011 — Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) do not properly preserve ACL behavior after a migration, which allows remote attackers to bypass intended access restrictions via an unspecified type of network traffic that had previously been denied, aka Bug ID CSCte46460. Dispositivos Cisco Adaptive Security Appliances (ASA) serie 5500 con software anterior a v8.3 (2) no previene de forma adecuada el comportamiento de las listas de control de acceso ACL después de un... • http://www.cisco.com/en/US/docs/security/asa/asa83/release/notes/asarn83.pdf • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 62EXPL: 0

07 Jan 2011 — The Mobile User Security (MUS) service on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) does not properly authenticate HTTP requests from a Web Security appliance (WSA), which might allow remote attackers to obtain sensitive information via a HEAD request, aka Bug ID CSCte53635. El servicio Mobile User Segurity (MUS) en dispositivos Cisco Adaptive Security Appliances (ASA) series 5500 con software anterior a v8.3 (2) no autentican correctamente a las peticiones HTT... • http://secunia.com/advisories/42931 • CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 1%CPEs: 62EXPL: 0

07 Jan 2011 — Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) allows remote attackers to cause a denial of service (device crash) via multicast traffic, aka Bug IDs CSCtg61810 and CSCtg69742. Vulnerabilidad no especificada en dispositivos Cisco Adaptive Security Appliances (ASA) serie 5500 con software anteriore a v8.3 (2) permite a atacantes remotos provocar una denegación de servicio (caída del dispositivo) a través del tráfico multicast, también con... • http://secunia.com/advisories/42931 •

CVSS: 7.8EPSS: 1%CPEs: 62EXPL: 0

07 Jan 2011 — Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) allows remote attackers to cause a denial of service (device crash) via a large number of LAN-to-LAN (aka L2L) IPsec sessions, aka Bug ID CSCth36592. Vulnerabilidad no especifica en dispositivos Cisco Adaptive Security Appliances (ASA) de las serie 5500 con software anterior a la v8.3 (2) permite a atacantes remotos causar una denegación de servicio (caída del dispositivo) a través de un núm... • http://secunia.com/advisories/42931 •

CVSS: 7.5EPSS: 1%CPEs: 58EXPL: 0

07 Jan 2011 — Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) allow remote attackers to cause a denial of service (ASDM syslog outage) via a long URL, aka Bug IDs CSCsm11264 and CSCtb92911. Los dispositivos Cisco Adaptive Security Appliances (ASA) 5500 series con software anterior a 8.2(3) permiten a atacantes remotos provocar una denegación de servicio (caída del syslog ASDM) a través de una URL extensa. También conocido como Bug IDs CSCsm11264 y CSCtb92911. • http://www.cisco.com/en/US/docs/security/asa/asa82/release/notes/asarn82.pdf • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 1%CPEs: 60EXPL: 3

07 Jan 2011 — The Neighbor Discovery (ND) protocol implementation in the IPv6 stack on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2(3) and earlier, and Cisco PIX Security Appliances devices, allows remote attackers to cause a denial of service (CPU consumption and device hang) by sending many Router Advertisement (RA) messages with different source addresses, as demonstrated by the flood_router6 program in the thc-ipv6 package, aka Bug ID CSCti24526. La implantación del protocolo "Neighb... • http://events.ccc.de/congress/2010/Fahrplan/events/3957.en.html • CWE-399: Resource Management Errors •