Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2006-0515

5 documents5 sources
Severity
7.5HIGH
EPSS
5.9%
top 9.37%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 9
Latest updateMay 1

Description

Cisco PIX/ASA 7.1.x before 7.1(2) and 7.0.x before 7.0(5), PIX 6.3.x before 6.3.5(112), and FWSM 2.3.x before 2.3(4) and 3.x before 3.1(7), when used with Websense/N2H2, allows remote attackers to bypass HTTP access restrictions by splitting the GET method of an HTTP request into multiple packets, which prevents the request from being sent to Websense for inspection, aka bugs CSCsc67612, CSCsc68472, and CSCsd81734.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages4 packages

NVDcisco/pix_firewall6.2.2.111, 6.2.3_\(110\), 6.3.3_\(133\)+2
NVDcisco/pix_firewall_software57 versions+56

Patches

🔴Vulnerability Details

2
GHSA
GHSA-j2r7-q5gp-wrjq: Cisco PIX/ASA 72022-05-01
CVEList
CVE-2006-0515: Cisco PIX/ASA 72006-05-09

💥Exploits & PoCs

1
Exploit-DB
Cisco - WebSense Content Filtering Bypass2006-05-08