Page 9 of 45 results (0.001 seconds)

CVSS: 5.0EPSS: 6%CPEs: 1EXPL: 1

Cisco Secure PIX Firewall does not properly identify forged TCP Reset (RST) packets, which allows remote attackers to force the firewall to close legitimate connections. • https://www.exploit-db.com/exploits/20067 http://www.cisco.com/warp/public/707/pixtcpreset-pub.shtml http://www.osvdb.org/1457 http://www.securityfocus.com/bid/1454 http://www.securityfocus.com/templates/archive.pike?list=1&msg=B3D6883199DBD311868100A0C9FC2CDC046B72%40protea.citec.net https://exchange.xforce.ibmcloud.com/vulnerabilities/4928 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Check Point Firewall-1 allows remote attackers to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt. • http://www.kb.cert.org/vuls/id/328867 http://www.osvdb.org/4417 http://www.securityfocus.com/bid/979 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Cisco PIX firewall manager (PFM) on Windows NT allows attackers to connect to port 8080 on the PFM server and retrieve any file whose name and location is known. • http://www.cisco.com/warp/public/770/pixmgrfile-pub.shtml http://www.osvdb.org/685 •

CVSS: 5.0EPSS: 2%CPEs: 5EXPL: 0

Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service. • http://www.osvdb.org/1097 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

By design, the "established" command on the Cisco PIX firewall allows connections from one host to arbitrary ports of a target host if an alternative conduit has already been allowed, which can cause administrators to configure less restrictive access controls than intended if they do not understand this functionality. • http://www.cisco.com/warp/public/707/pixest-pub.shtml http://www.kb.cert.org/vuls/id/6733 https://exchange.xforce.ibmcloud.com/vulnerabilities/8052 •