4 results (0.014 seconds)

CVSS: 7.8EPSS: 2%CPEs: 16EXPL: 0

The Cisco Firewall Services Module (FWSM) 2.x, 3.1 before 3.1(16), 3.2 before 3.2(13), and 4.0 before 4.0(6) for Cisco Catalyst 6500 switches and Cisco 7600 routers allows remote attackers to cause a denial of service (traffic-handling outage) via a series of malformed ICMP messages. Cisco Firewall Services Module (FWSM) 2.x, 3.1 antes de 3.1(16), 3.2 antes de 3.2(13)y 4.0 antes de 4.0(6) para los switches Cisco Catalyst 6500 y los routers Cisco 7600 permite a atacantes remotos provocar una denegación de servicio (parada de la gestión del tráfico) mediante una serie de mensajes ICMP malformados. • http://secunia.com/advisories/36373 http://securitytracker.com/id?1022747 http://www.cisco.com/en/US/products/products_security_advisory09186a0080af0d1d.shtml http://www.securityfocus.com/bid/36085 http://www.vupen.com/english/advisories/2009/2329 https://exchange.xforce.ibmcloud.com/vulnerabilities/52591 •

CVSS: 7.8EPSS: 3%CPEs: 3EXPL: 0

Unspecified vulnerability in Cisco Firewall Services Module (FWSM) 3.2(3) allows remote attackers to cause a denial of service (device reload) via crafted "data in the control-plane path with Layer 7 Application Inspections." Vulnerabilidad no especificada en Cisco Firewall Services Module (FWSM) 3.2(3) permite a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) mediante "datos manipulados en la ruta del plano de control con Inspecciones de Capa 7 de Applicación". • http://secunia.com/advisories/28175 http://www.cisco.com/en/US/products/products_security_advisory09186a008091b11d.shtml http://www.osvdb.org/39298 http://www.securityfocus.com/bid/26941 http://www.securitytracker.com/id?1019120 http://www.vupen.com/english/advisories/2007/4270 https://exchange.xforce.ibmcloud.com/vulnerabilities/39135 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Cisco Firewall Services Module (FWSM) 3.2(1), and 3.1(5) and earlier, allows remote attackers to cause a denial of service (device reload) via a crafted HTTPS request, aka CSCsi77844. Cisco Firewall Services Module (FWSM) 3.2(1), y 3.1(5) y anteriores, permite a atacantes remotos provocar denegación de servicio (recarga de dispositivo) a través de una respuesta HTTPS manipulada, también conocido como CSCsi77844. • http://secunia.com/advisories/27236 http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda61.shtml http://www.securityfocus.com/bid/26109 http://www.securitytracker.com/id?1018825 http://www.vupen.com/english/advisories/2007/3530 https://exchange.xforce.ibmcloud.com/vulnerabilities/37251 • CWE-20: Improper Input Validation •

CVSS: 6.8EPSS: 4%CPEs: 2EXPL: 0

Cisco Firewall Services Module (FWSM) 3.1(6), and 3.2(2) and earlier, does not properly enforce edited ACLs, which might allow remote attackers to bypass intended restrictions on network traffic, aka CSCsj52536. Cisco Firewall Services Module (FWSM) 3.1(6), y 3.2(2) y anteriores, no aplica correctamente la edición de ACLs, lo cual podría permitir a atacantes remotos evitar restricciones intencionadas sobre el tráfico de red, también conocido como CSCsj52536. • http://secunia.com/advisories/27236 http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda61.shtml http://www.securityfocus.com/bid/26109 http://www.securitytracker.com/id?1018825 http://www.vupen.com/english/advisories/2007/3530 https://exchange.xforce.ibmcloud.com/vulnerabilities/37258 • CWE-264: Permissions, Privileges, and Access Controls •