
CVE-2014-3391
https://notcve.org/view.php?id=CVE-2014-3391
10 Oct 2014 — Untrusted search path vulnerability in Cisco ASA Software 8.x before 8.4(3), 8.5, and 8.7 before 8.7(1.13) allows local users to gain privileges by placing a Trojan horse library file in external memory, leading to library use after device reload because of an incorrect LD_LIBRARY_PATH value, aka Bug ID CSCtq52661. Vulnerabilidad de ruta de búsqueda no confiable en Cisco ASA Software 8.x anterior a 8.4(3), 8.5, y 8.7 anterior a 8.7(1.13) permite a usuarios locales ganar privilegios mediante la colocación de... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa • CWE-20: Improper Input Validation •

CVE-2014-3394
https://notcve.org/view.php?id=CVE-2014-3394
10 Oct 2014 — The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(7.15), 8.6 before 8.6(1.14), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to bypass certificate validation via an arbitrary VeriSign certificate, aka Bug ID CSCun10916. La implementación Smart Call Home (SCH) en Cisco ASA Software 8.2 anterior a 8.2(5.50), 8.4 anterior a 8.4(7.15), 8.6 anterior a 8.6(1.14), 8.7 anterior a 8.7(1.13), 9.0 anterior a 9.0(4.8), y 9.1 ... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa • CWE-295: Improper Certificate Validation •

CVE-2014-3392
https://notcve.org/view.php?id=CVE-2014-3392
10 Oct 2014 — The Clientless SSL VPN portal in Cisco ASA Software 8.2 before 8.2(5.51), 8.3 before 8.3(2.42), 8.4 before 8.4(7.23), 8.6 before 8.6(1.15), 9.0 before 9.0(4.24), 9.1 before 9.1(5.12), 9.2 before 9.2(2.8), and 9.3 before 9.3(1.1) allows remote attackers to obtain sensitive information from process memory or modify memory contents via crafted parameters, aka Bug ID CSCuq29136. El portal Clientless SSL VPN en Cisco ASA Software 8.2 anterior a 8.2(5.51), 8.3 anterior a 8.3(2.42), 8.4 anterior a 8.4(7.23), 8.6 a... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa •

CVE-2014-3390
https://notcve.org/view.php?id=CVE-2014-3390
10 Oct 2014 — The Virtual Network Management Center (VNMC) policy implementation in Cisco ASA Software 8.7 before 8.7(1.14), 9.2 before 9.2(2.8), and 9.3 before 9.3(1.1) allows local users to obtain Linux root access by leveraging administrative privileges and executing a crafted script, aka Bug IDs CSCuq41510 and CSCuq47574. La implementación de política Virtual Network Management Center (VNMC) en Cisco ASA Software 8.7 anterior a 8.7(1.14), 9.2 anterior a 9.2(2.8), y 9.3 anterior a 9.3(1.1) permite a usuarios locales o... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa • CWE-20: Improper Input Validation •

CVE-2014-3399
https://notcve.org/view.php?id=CVE-2014-3399
07 Oct 2014 — The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.2(.2.4) and earlier does not properly manage session information during creation of a SharePoint handler, which allows remote authenticated users to overwrite arbitrary RAMFS cache files or inject Lua programs, and consequently cause a denial of service (portal outage or system reload), via crafted HTTP requests, aka Bug ID CSCup54208. La implementación SSL VPN en el software Cisco Adaptive Security Appliance (ASA) 9.2(.2.4) y ... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3399 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2013-5567
https://notcve.org/view.php?id=CVE-2013-5567
14 Jul 2014 — Cisco Adaptive Security Appliance (ASA) Software 8.4(.6) and earlier, when using an unsupported configuration with overlapping criteria for filtering and inspection, allows remote attackers to cause a denial of service (traffic loop and device crash) via a packet that triggers multiple matches, aka Bug ID CSCui45606. Cisco Adaptive Security Appliance (ASA) Software 8.4(.6) y anteriores, cuando utilice una configuración no soportada con criterios sobrepuestos para el filtrado y la inspección, permite a ataca... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5567 • CWE-400: Uncontrolled Resource Consumption •

CVE-2013-6691
https://notcve.org/view.php?id=CVE-2013-6691
14 Jul 2014 — The WebVPN CIFS implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0(.4.1) and earlier allows remote CIFS servers to cause a denial of service (device reload) via a long share list, aka Bug ID CSCuj83344. La implementación WebVPN CIFS en Cisco Adaptive Security Appliance (ASA) Software 9.0(.4.1) y anteriores permite a servidores CIFS remotos causar una denegación de servicio (reinicio de dispositivo) a través de una lista larga de recursos compartidos, también conocido como Bug ID CSCuj833... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6691 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2014-2151
https://notcve.org/view.php?id=CVE-2014-2151
18 Jun 2014 — The WebVPN portal in Cisco Adaptive Security Appliance (ASA) Software 8.4(.7.15) and earlier allows remote authenticated users to obtain sensitive information via a crafted JavaScript file, aka Bug ID CSCui04520. El portal WebVPN en Cisco Adaptive Security Appliance (ASA) Software 8.4(.7.15) y anteriores permite a usuarios remotos autenticados obtener información sensible a través de un fichero JavaScript manipulado, también conocido como Bug ID CSCui04520. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2151 •

CVE-2014-3264
https://notcve.org/view.php?id=CVE-2014-3264
20 May 2014 — Cisco Adaptive Security Appliance (ASA) Software 9.1(.5) and earlier allows remote authenticated users to cause a denial of service (device reload) via crafted attributes in a RADIUS packet, aka Bug ID CSCun69561. Cisco Adaptive Security Appliance (ASA) Software 9.1(.5) y anteriores permite a usuarios remotos autenticados causar una denegación de servicio (reinicio de dispositivo) a través de atributos manipulados en un paquete RADIUS, también conocido como Bug ID CSCun69561. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3264 •

CVE-2014-2127 – Cisco ASA SSL VPN Privilege Escalation
https://notcve.org/view.php?id=CVE-2014-2127
10 Apr 2014 — Cisco Adaptive Security Appliance (ASA) Software 8.x before 8.2(5.48), 8.3 before 8.3(2.40), 8.4 before 8.4(7.9), 8.6 before 8.6(1.13), 9.0 before 9.0(4.1), and 9.1 before 9.1(4.3) does not properly process management-session information during privilege validation for SSL VPN portal connections, which allows remote authenticated users to gain privileges by establishing a Clientless SSL VPN session and entering crafted URLs, aka Bug ID CSCul70099. Cisco Adaptive Security Appliance (ASA) Software 8.x anterio... • https://packetstorm.news/files/id/181167 • CWE-20: Improper Input Validation •