Page 8 of 45 results (0.003 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

The encryption algorithms for enable and passwd commands on Cisco PIX Firewall can be executed quickly due to a limited number of rounds, which make it easier for an attacker to decrypt the passwords using brute force techniques. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0121.html http://marc.info/?l=bugtraq&m=102651159507659&w=2 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

Cisco PIX firewall manager (PFM) 4.3(2)g logs the enable password in plaintext in the pfm.log file, which could allow local users to obtain the password by reading the file. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0071.html http://www.kb.cert.org/vuls/id/639507 http://www.securityfocus.com/bid/3419 https://exchange.xforce.ibmcloud.com/vulnerabilities/7265 •

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 2

Cisco PIX Firewall 515 and 520 with 5.1.4 OS running aaa authentication to a TACACS+ server allows remote attackers to cause a denial of service via a large number of authentication requests. • https://www.exploit-db.com/exploits/20734 http://marc.info/?l=bugtraq&m=98658271707833&w=2 http://www.cisco.com/warp/public/707/pixfirewall-authen-flood-pub.shtml http://www.securityfocus.com/bid/2551 https://exchange.xforce.ibmcloud.com/vulnerabilities/6353 •

CVSS: 7.5EPSS: 4%CPEs: 8EXPL: 2

The mailguard feature in Cisco Secure PIX Firewall 5.2(2) and earlier does not properly restrict access to SMTP commands, which allows remote attackers to execute restricted commands by sending a DATA command before sending the restricted commands. • https://www.exploit-db.com/exploits/20231 http://archives.neohapsis.com/archives/bugtraq/2000-09/0222.html http://archives.neohapsis.com/archives/bugtraq/2000-09/0241.html http://www.cisco.com/warp/public/707/PIXfirewallSMTPfilter-pub.shtml http://www.securityfocus.com/bid/1698 https://exchange.xforce.ibmcloud.com/vulnerabilities/5277 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 2

Cisco Secure PIX Firewall 5.2(2) allows remote attackers to determine the real IP address of a target FTP server by flooding the server with PASV requests, which includes the real IP address in the response when passive mode is established. • https://www.exploit-db.com/exploits/20369 http://marc.info/?l=bugtraq&m=97059440000367&w=2 http://www.osvdb.org/1623 http://www.securityfocus.com/bid/1877 https://exchange.xforce.ibmcloud.com/vulnerabilities/5646 •