The OVAL Repository5.82015-09-03T10:16:39.820-04:00Cisco PIX and ASA Windows NT Domain Authentication Bypass VulnerabilityCisco PIXUnspecified vulnerability in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.0 before 7.0(8)3, 7.1 before 7.1(2)78, 7.2 before 7.2(4)16, 8.0 before 8.0(4)6, and 8.1 before 8.1(1)13, when configured as a VPN using Microsoft Windows NT Domain authentication, allows remote attackers to bypass VPN authentication via unknown vectors.Yuzheng ZhouDRAFTINTERIMACCEPTEDACCEPTEDCisco ASA and PIX Crypto Accelerator Memory Leak VulnerabilityCisco PIXMemory leak in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 8.0 before 8.0(4) and 8.1 before 8.1(2) allows remote attackers to cause a denial of service (memory consumption) via an unspecified sequence of packets, related to the "initialization code for the hardware crypto accelerator."Yuzheng ZhouDRAFTINTERIMACCEPTEDACCEPTEDCisco PIX and ASA IPv6 Denial of Service VulnerabilityCisco PIXUnspecified vulnerability in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.2(4)9 and 7.2(4)10 allows remote attackers to cause a denial of service (device reload) via a crafted IPv6 packet.Yuzheng ZhouDRAFTINTERIMACCEPTEDACCEPTEDshow running-config7\.0\([0-7]\)\d*|7\.0\(8\)[0-2]?$|7\.1\([0-1]\)\d*|7\.1\(2\)(\d?|[1-6]\d|7[0-7])$|7\.2\([0-3]\)\d*|7\.2\(4\)(\d?|1[0-5])$|8\.0\([0-3]\)\d*|8\.0\(4\)[0-5]?$|8\.1\(0\)\d*|8\.1\(1\)(\d?|1[0-2])$show running-config^\s*nt-auth-domain-controller8\.0\([0-3]\)|8\.1\([0-1]\)show running-configipv67\.2\([0-3]\)\d*|7\.2\(4\)(\d?|10)$show running-configno\s+ipv6