<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									CVE-2024-20353 - Common Vulnerabilities and Exposures				            </title>
            <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-20353/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Sun, 19 Apr 2026 07:15:01 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2024-20353</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-20353/#post-277</link>
                        <pubDate>Tue, 30 Apr 2024 01:34:24 +0000</pubDate>
                        <description><![CDATA[A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, r...]]></description>
                        <content:encoded><![CDATA[<p><span>A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted web server on a device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads.</span></p>
<h2 class="ud-layout-subheader">Vulnerable Products</h2>
<div id="vulnerableproducts" class="ud-innercontent-area">
<p>This vulnerability affects Cisco ASA Software and FTD Software.</p>
</div>
<div>
<p class=""><strong>Base Score:<span> </span></strong><span>7.8</span></p>
</div>
<div>
<p class=""><strong>Vector:<span> </span></strong><span>CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C</span></p>
</div>
<div>
<p class=""><strong>Severity:<span> </span></strong><span>High</span></p>
</div>
<div id="vulnerableproducts" class="ud-innercontent-area">
<p> </p>
</div>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/common-vulnerabilities-and-exposures/">Common Vulnerabilities and Exposures</category>                        <dc:creator>Kustar</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-20353/#post-277</guid>
                    </item>
							        </channel>
        </rss>
		