Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:h:cisco:firewall_services_module:-:*:*:*:*:*:*:*
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2013-1193 |
The Secure Shell (SSH) implementation on Cisco Adaptive Security Appliances (ASA) devices, and in Cisco Firewall Services Module (FWSM), does not properly terminate sessions, which allows remote attackers to cause a denial of service (SSH service outage) by repeatedly establishing SSH connections, aka Bug IDs CSCue63881, CSCuf51892, CSCue78671, and CSCug26937. Published: April 16, 2013; 10:04:30 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2007-5568 |
Cisco PIX and ASA appliances with 7.0 through 8.0 software, and Cisco Firewall Services Module (FWSM) 3.1(5) and earlier, allow remote attackers to cause a denial of service (device reload) via a crafted MGCP packet, aka CSCsi90468 (appliance) and CSCsi00694 (FWSM). Published: October 18, 2007; 5:17:00 PM -0400 |
V3.x:(not available) V2.0: 7.1 HIGH |
CVE-2005-1517 |
Unknown vulnerability in Cisco Firewall Services Module (FWSM) 2.3.1 and earlier, when using URL, FTP, or HTTPS filtering exceptions, allows certain TCP packets to bypass access control lists (ACLs). Published: May 11, 2005; 12:00:00 AM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |