CVE-2010-1575
- EPSS 0.27%
- Published 06.07.2010 17:17:13
- Last modified 11.04.2025 00:51:21
The Cisco Content Services Switch (CSS) 11500 with software 08.20.1.01 conveys authentication data through ClientCert-* headers but does not delete client-supplied ClientCert-* headers, which might allow remote attackers to bypass authentication via ...
CVE-2010-1576
- EPSS 0.23%
- Published 06.07.2010 17:17:13
- Last modified 11.04.2025 00:51:21
The Cisco Content Services Switch (CSS) 11500 with software before 8.20.4.02 and the Application Control Engine (ACE) 4710 with software before A2(3.0) do not properly handle use of LF, CR, and LFCR as alternatives to the standard CRLF sequence betwe...
CVE-2010-2629
- EPSS 0.33%
- Published 06.07.2010 17:17:13
- Last modified 11.04.2025 00:51:21
The Cisco Content Services Switch (CSS) 11500 with software 8.20.4.02 and the Application Control Engine (ACE) 4710 with software A2(3.0) do not properly handle LF header terminators in situations where the GET line is terminated by CRLF, which allow...
- EPSS 1.27%
- Published 05.04.2006 18:04:00
- Last modified 03.04.2025 01:03:51
Unspecified vulnerability in the HTTP compression functionality in Cisco CSS 11500 Series Content Services switches allows remote attackers to cause a denial of service (device reload) via (1) "valid, but obsolete" or (2) "specially crafted" HTTP req...
- EPSS 0.49%
- Published 02.11.2005 00:02:00
- Last modified 03.04.2025 01:03:51
Cisco CSS 11500 Content Services Switch (CSS) with SSL termination services allows remote attackers to cause a denial of service (memory corruption and device reload) via a malformed client certificate during SSL session negotiation.
- EPSS 80.86%
- Published 31.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes ...
CVE-2004-0079
- EPSS 2.06%
- Published 23.11.2004 05:00:00
- Last modified 03.04.2025 01:03:51
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
- EPSS 2.27%
- Published 23.11.2004 05:00:00
- Last modified 03.04.2025 01:03:51
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
- EPSS 0.67%
- Published 23.11.2004 05:00:00
- Last modified 03.04.2025 01:03:51
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a ...
- EPSS 0.53%
- Published 31.12.2003 05:00:00
- Last modified 03.04.2025 01:03:51
The DNS server for Cisco Content Service Switch (CSS) 11000 and 11500, when prompted for a nonexistent AAAA record, responds with response code 3 (NXDOMAIN or "Name Error") instead of response code 0 ("No Error"), which allows remote attackers to cau...