Page 8 of 205 results (0.011 seconds)

CVSS: 5.3EPSS: 0%CPEs: 26EXPL: 0

16 Jan 2016 — Cisco Adaptive Security Appliance (ASA) Software 8.4 allows remote attackers to obtain sensitive information via an AnyConnect authentication attempt, aka Bug ID CSCuo65775. Cisco Adaptive Security Appliance (ASA) Software 8.4 permite a atacantes remotos obtener información sensible a través de un intento de autenticación AnyConnect, también conocido como Bug ID CSCuo65775. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160115-asa • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 7EXPL: 0

15 Jan 2016 — The DCERPC Inspection implementation in Cisco Adaptive Security Appliance (ASA) Software 9.4.1 through 9.5.1 allows remote authenticated users to bypass an intended DCERPC-only ACL by sending arbitrary network traffic, aka Bug ID CSCuu67782. La implementación DCERPC Inspection en Cisco Adaptive Security Appliance (ASA) Software 9.4.1 hasta la versión 9.5.1 permite a usuarios remotos autenticados eludir una ACL destinada a DCERPC-only mediante el envío de tráfico de red arbitrario, también conocido como Bug ... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160111-asa • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

25 Nov 2015 — The XML parser in the management interface in Cisco Adaptive Security Appliance (ASA) Software 8.4 allows remote authenticated users to cause a denial of service (device crash) via a crafted XML document, aka Bug ID CSCut14223. El parser XML en la interfaz de gestión en Cisco Adaptive Security Appliance (ASA) Software 8.4 permite a usuarios remotos autenticados causar una denegación de servicio (caída de dispositivo) a través de un documento XML manipulado, también conocida como Bug ID CSCut14223. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151123-asa • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 181EXPL: 0

25 Oct 2015 — Cisco Adaptive Security Appliance (ASA) software 7.2 and 8.2 before 8.2(5.58), 8.3 and 8.4 before 8.4(7.29), 8.5 through 8.7 before 8.7(1.17), 9.0 before 9.0(4.37), 9.1 before 9.1(6.6), 9.2 before 9.2(4), 9.3 before 9.3(3.5), and 9.4 before 9.4(1.5) allows remote attackers to cause a denial of service (device reload) via a crafted DNS response, aka Bug ID CSCuu07799. Cisco Adaptive Security Appliance (ASA) software 7.2 y 8.2 en versiones anteriores a 8.2(5.58), 8.3 y 8.4 en versiones anteriores a 8.4(7.29),... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns2 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 49EXPL: 0

25 Oct 2015 — The DHCPv6 relay implementation in Cisco Adaptive Security Appliance (ASA) software 9.0 before 9.0(4.37), 9.1 before 9.1(6.6), 9.2 before 9.2(4), 9.3 before 9.3(3.5), and 9.4 before 9.4(2) allows remote attackers to cause a denial of service (device reload) via crafted DHCPv6 packets, aka Bug IDs CSCus56252 and CSCus57142. La implementación DHCPv6 relay en Cisco Adaptive Security Appliance (ASA) software 9.0 en versiones anteriores a 9.0(4.37), 9.1 en versiones anteriores a 9.1(6.6), 9.2 en versiones anteri... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dhcp1 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 175EXPL: 0

25 Oct 2015 — Cisco Adaptive Security Appliance (ASA) software 7.2 and 8.2 before 8.2(5.58), 8.3 and 8.4 before 8.4(7.29), 8.5 through 8.7 before 8.7(1.17), 9.0 before 9.0(4.37), 9.1 before 9.1(6.4), 9.2 before 9.2(4), 9.3 before 9.3(3.1), and 9.4 before 9.4(1.1) allows remote attackers to cause a denial of service (device reload) via a crafted DNS response, aka Bug ID CSCut03495. Cisco Adaptive Security Appliance (ASA) software 7.2 y 8.2 en versiones anteriores a 8.2(5.58), 8.3 y 8.4 en versiones anteriores a 8.4(7.29),... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns1 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 174EXPL: 0

25 Oct 2015 — The IKEv1 implementation in Cisco Adaptive Security Appliance (ASA) software 7.2 and 8.2 before 8.2(5.58), 8.3 and 8.4 before 8.4(7.29), 8.5 through 8.7 before 8.7(1.17), 9.0 before 9.0(4.37), 9.1 before 9.1(6.8), 9.2 before 9.2(4), and 9.3 before 9.3(3) allows remote attackers to cause a denial of service (device reload) via crafted ISAKMP UDP packets, aka Bug ID CSCus94026. La implementación IKEv1 en Cisco Adaptive Security Appliance (ASA) software 7.2 y 8.2 en versiones anteriores a 8.2(5.58), 8.3 y 8.4 ... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-ike • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

20 Aug 2015 — The Unicast Reverse Path Forwarding (uRPF) implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(1.50), 9.3(2.100), 9.3(3), and 9.4(1) mishandles cases where an IP address belongs to an internal interface but is also in the ASA routing table, which allows remote attackers to bypass uRPF validation via spoofed packets, aka Bug ID CSCuv60724. Vulnerabilidad en la implementación Unicast Reverse Path Forwarding (uRPF) en Cisco Adaptive Security Appliance (ASA) Software 9.3(1.50), 9.3(2.100), 9.... • http://tools.cisco.com/security/center/viewAlert.x?alertId=40440 • CWE-20: Improper Input Validation •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

18 Jul 2015 — The TLS implementation in the Cavium cryptographic-module firmware, as distributed with Cisco Adaptive Security Appliance (ASA) Software 9.1(5.21) and other products, does not verify the MAC field, which allows man-in-the-middle attackers to spoof TLS content by modifying packets, aka Bug ID CSCuu52976. Vulnerabilidad en la implementación TLS en el firmware del módulo criptográfico de Cavium, asi como el distribuido con el Software Cisco Adaptive Security Apliance (ASA) 9.1 (5.21) y otros productos, no veri... • http://tools.cisco.com/security/center/viewAlert.x?alertId=39919 • CWE-310: Cryptographic Issues •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

08 Jul 2015 — Cisco Adaptive Security Appliance (ASA) Software 9.3(2) allows remote attackers to cause a denial of service (system reload) by sending crafted OSPFv2 packets on the local network, aka Bug ID CSCut52679. Cisco Adaptive Security Appliance (ASA) Software 9.3(2) permite a atacantes remotos causar una denegación de servicio (recarga de sistema) mediante el envío de paquetes OSPFv2 manipulados en la red local, también conocido como Bug ID CSCut52679. • http://tools.cisco.com/security/center/viewAlert.x?alertId=39641 •