Page 9 of 42 results (0.004 seconds)

CVSS: 7.1EPSS: 2%CPEs: 2EXPL: 0

The HTTP server in Cisco Adaptive Security Appliance (ASA) 5500 devices 8.0 before 8.0(3)15 and 8.1 before 8.1(1)5, when configured as a clientless SSL VPN endpoint, does not properly process URIs, which allows remote attackers to cause a denial of service (device reload) via a URI in a crafted SSL or HTTP packet, aka Bug ID CSCsq19369. Servidor HTTP en los dispositivos Cisco Adaptive Security Appliance (ASA) 5500 8.0 anterior a 8.0(3)15 y 8.1 anterior a 8.1(1)5, cuando se configura como SSL VPN endpoint sin clientes no procesa adecuadamente las URIs, lo que permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) a través de una URI en un paquete SSL o HTTP manipulado, también conocido como Bug ID CSCsq19369. • http://secunia.com/advisories/31730 http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml http://www.securityfocus.com/bid/30998 http://www.securitytracker.com/id?1020812 https://exchange.xforce.ibmcloud.com/vulnerabilities/44869 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in Cisco Adaptive Security Appliance (ASA) 5500 devices 8.0(3)15, 8.0(3)16, 8.1(1)4, and 8.1(1)5, when configured as a clientless SSL VPN endpoint, allows remote attackers to obtain usernames and passwords via unknown vectors, aka Bug ID CSCsq45636. Vulnerabilidad no especificada en Cisco Adaptive Security Appliance (ASA) 5500 dispositivos 8.0(3)15, 8.0(3)16, 8.1(1)4, y 8.1(1)5, cuando se configuran como punto final sin cliente SSL VPN; permite a atacantes remotos obtener nombres de usuario y contraseñas a través de vectores desconocidos. También se conoce como Bug ID CSCsq45636. • http://secunia.com/advisories/31730 http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa http://www.cisco.com/en/US/docs/security/asa/asa81/release/notes/asarn812.html http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml http://www.securityfocus.com/bid/30998 http://www.securitytracker.com/id?1020813 https://exchange.xforce.ibmcloud.com/vulnerabilities/44870 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •