Page 8 of 41 results (0.013 seconds)

CVSS: 5.0EPSS: 2%CPEs: 6EXPL: 0

Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 before 7.0(8.10), 7.2 before 7.2(4.45), 8.0 before 8.0(5.1), 8.1 before 8.1(2.37), and 8.2 before 8.2(1.15); and Cisco PIX 500 Series Security Appliance; allows remote attackers to cause a denial of service (active IPsec tunnel loss and prevention of new tunnels) via a malformed IKE message through an existing tunnel to UDP port 4500, aka Bug ID CSCtc47782. Vulnerabilidad no especificada en Cisco ASA 5500 Series Adaptive Security Appliance v7.0 anterior a v7.0(8.10), v7.2 anterior a v7.2(4.45), v8.0 anterior a v8.0(5.1), 8.1 anterior a v8.1(2.37), y v8.2 anterior a v8.2(1.15), y Cisco PIX 500 Series Security Appliance, permite a atacantes remotos provocar una denegación de servicio (pérdida del túnel IPsec activo y la prevención de nuevos túneles) mediante un mensaje IKE malformado a través de un túnel existente en el puerto UDP 4500, también conocido como Bug ID CSCtc47782. • http://osvdb.org/62436 http://secunia.com/advisories/38618 http://secunia.com/advisories/38636 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml http://www.securityfocus.com/bid/38279 http://www.securitytracker.com/id?1023612 http://www.vupen.com/english/advisories/2010/0415 https://exchange.xforce.ibmcloud.com/vulnerabilities/56341 •

CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 0

Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 before 7.0(8.10), 7.2 before 7.2(4.45), 8.0 before 8.0(5.7), 8.1 before 8.1(2.40), and 8.2 before 8.2(2.1); and Cisco PIX 500 Series Security Appliance; allows remote attackers to bypass NTLMv1 authentication via a crafted username, aka Bug ID CSCte21953. Vulnerabilidad no especificada en Cisco ASA 5500 Series Adaptive Security Appliance v7.0 anterior a v7.0(8.10), v7.2 anterior a v7.2(4.45), v8.0 anterior a v8.0(5.2), 8.1 anterior a v8.1(2.40), y v8.2 anterior a v8.2(2.1), y Cisco PIX 500 Series Security Appliance, permite a atacantes remotos evitar la autenticación a través de un nombre de usuario NTLMv1 manipulado, también conocido como Bug ID CSCte21953. • http://osvdb.org/62437 http://secunia.com/advisories/38618 http://secunia.com/advisories/38636 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml http://www.securityfocus.com/bid/38279 http://www.securitytracker.com/id?1023612 http://www.vupen.com/english/advisories/2010/0415 https://exchange.xforce.ibmcloud.com/vulnerabilities/56342 •

CVSS: 7.8EPSS: 1%CPEs: 6EXPL: 0

Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.2 before 7.2(4.45), 8.0 before 8.0(4.44), 8.1 before 8.1(2.35), and 8.2 before 8.2(1.10), allows remote attackers to cause a denial of service (page fault and device reload) via a malformed DTLS message, aka Bug ID CSCtb64913 and "WebVPN DTLS Denial of Service Vulnerability." Vulnerabilidad no especificada en Cisco ASA 5500 Series Adaptive Security Appliance v7.2 anterior a v7.2(4.45), v8.0 anterior a v8.0(4.44), 8.1 anterior a v8.1(2.35), y v8.2 anterior a v8.2(1.10), permite a atacantes remotos provocar una denegación de servicio (fallo de página y reinicio del dispositivo) a través de un mensaje DTLS incorrecto , también conocido como Bug ID CSCtb64913 y "WebVPN DTLS Vulnerabilidad de Denegación de Servicio." • http://osvdb.org/62430 http://secunia.com/advisories/38618 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml http://www.securityfocus.com/bid/38280 http://www.securitytracker.com/id?1023612 http://www.vupen.com/english/advisories/2010/0415 https://exchange.xforce.ibmcloud.com/vulnerabilities/56339 •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 0

Unspecified vulnerability in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.0 before 7.0(8)3, 7.1 before 7.1(2)78, 7.2 before 7.2(4)16, 8.0 before 8.0(4)6, and 8.1 before 8.1(1)13, when configured as a VPN using Microsoft Windows NT Domain authentication, allows remote attackers to bypass VPN authentication via unknown vectors. Vulnerabilidad no especificada en Cisco Adaptive Security Appliances (ASA) 5500 Series y PIX Security Appliances 7.0 versiones anteriores a 7.0(8)3, 7.1 versiones anteriores a 7.1(2)78, 7.2 versiones anteriores a 7.2(4)16, 8.0 versiones anteriores a 8.0(4)6, y 8.1 versiones anteriores a 8.1(1)13, cuando está configurado como una VPN utilizando la autenticación del dominio de Microsoft Windows NT, permite a atacantes remotos evitar la autenticación VPN a través de vectores desconocidos. • http://secunia.com/advisories/32360 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a183ba.shtml http://www.securityfocus.com/bid/31864 http://www.securitytracker.com/id?1021089 http://www.securitytracker.com/id?1021090 http://www.vupen.com/english/advisories/2008/2899 https://exchange.xforce.ibmcloud.com/vulnerabilities/46024 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5983 • CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 7%CPEs: 8EXPL: 0

Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the "inspect sip" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets. Cisco PIX 500 y ASA 5500 Series Security Appliances 6.x versiones anteriores a 6.3(5.115), 7.0 versiones anteriores a 7.0(5.2), y 7.1 versiones anteriores a 7.1(2.5), y el FWSM 3.x versiones anteriores a 3.1(3.24), cuando la opción "inspect sip" está habilitada, permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) mediante paquetes SIP mal-formados. • http://osvdb.org/33054 http://secunia.com/advisories/24160 http://secunia.com/advisories/24179 http://secunia.com/advisories/24180 http://securitytracker.com/id?1017651 http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml http://www.kb.cert.org/vuls/id/430969 http://www.securityfocus.com/bid/22561 http://www.securityfocus.com/bid/22562 http://www.securitytracker.com/ •