5 results (0.011 seconds)

CVSS: 7.8EPSS: 0%CPEs: 60EXPL: 0

Cisco ACE30 Application Control Engine Module through A5 3.3 and ACE 4700 Application Control Engine appliances through A5 3.3 allow remote attackers to cause a denial of service (device reload) via crafted (1) SSL or (2) TLS packets, aka Bug ID CSCvb16317. Dispositivos Cisco ACE30 Application Control Engine Module hasta la versión A5 3.3 y ACE 4700 Application Control Engine hasta la versión A5 3.3 permiten a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) a través de paquetes (1) SSL o (2) TLS manipulados, vulnerabilidad también conocida como Bug ID CSCvb16317. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace http://www.securityfocus.com/bid/92867 http://www.securitytracker.com/id/1036748 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.2) and Cisco ACE 4710 Application Control Engine Appliance before A1(8.0) allows remote attackers to cause a denial of service (device reload) via a crafted SNMPv3 packet. Vulnerabilidad no especificada en "Cisco ACE Application Control Engine Module" para Switches Catalyst 6500 y routers anteriores A1(v1.2) y Cisco ACE 4710 "Application Control Engine Appliance" anteriores A1(8.0), permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de un paquete SNMPv3 manipulada. • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml http://www.securityfocus.com/bid/33900 http://www.securitytracker.com/id?1021769 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.0EPSS: 0%CPEs: 5EXPL: 0

Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.2) and Cisco ACE 4710 Application Control Engine Appliance before A1(8a) allows remote authenticated users to execute arbitrary operating-system commands through a command line interface (CLI). Vulnerabilidad no especificada en Cisco ACE Application Control Engine Module para Catalyst 6500 Switches y 7600 Routers anterior a A2(1.2) y Cisco ACE 4710 Application Control Engine Appliance anterior a A1(8a), permite a usuarios autenticados en remoto ejecutar comandos de su elección del sistema-operativo a través de una interfaz de línea de comandos (CLI). • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml http://www.securityfocus.com/bid/33900 •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SSH packet. Vulnerabilidad no especificada en "Cisco ACE Application Control Engine Module" para Catalyst 6500 Switches y 7600 Routers anteriores A2(1.3) y Cisco ACE 4710 Application Control Engine Appliance anteriores a A3(2.1) que permite a los atacantes remotos causar una denegación de servicio (reinicio del dispositivo) a través de un paquete SSH manipulado. • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml http://www.securityfocus.com/bid/33900 •

CVSS: 6.8EPSS: 0%CPEs: 9EXPL: 0

Unspecified vulnerability in the SNMPv2c implementation in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SNMPv1 packet. Vulnerabilidad no especificada en la implementación SNMPv2c en Cisco ACE Application Control Engine Module para Catalyst 6500 Switches y 7600 Routers anteriores a A2(1.3) y Cisco ACE 4710 Application Control Engine Appliance anteior a A3(2.1); permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) a través de un paquete SNMPv1 manipulado. • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml http://www.securityfocus.com/bid/33900 http://www.securitytracker.com/id?1021769 •