Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco security agent 4.5 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2005-2280
Cisco Security Agent (CSA) 4.5 allows remote malicious users to cause a denial of service (system crash) via a crafted IP packet.
Cisco Security Agent 4.5
10
CVSSv2
CVE-2007-5580
Buffer overflow in a certain driver in Cisco Security Agent 4.5.1 prior to 4.5.1.672, 5.0 prior to 5.0.0.225, 5.1 prior to 5.1.0.106, and 5.2 prior to 5.2.0.238 on Windows allows remote malicious users to execute arbitrary code via a crafted SMB packet in a TCP session on port (1...
Cisco Security Agent 4.0
Cisco Security Agent 4.0.1
Cisco Security Agent 4.5.1.659
Cisco Security Agent 5.0
Cisco Security Agent 4.0.3.728
Cisco Security Agent 4.5
Cisco Security Agent 5.1
Cisco Security Agent 5.1.79
Cisco Security Agent 2.1
Cisco Security Agent 3
Cisco Security Agent 4.5.1
Cisco Security Agent 4.5.1.639
Cisco Security Agent 4.5.1.657
Cisco Security Agent 5.2
Cisco Security Agent 4.0.2
Cisco Security Agent 4.0.3
Cisco Security Agent 5.0.0.201
Cisco Security Agent 5.0.193
7.8
CVSSv2
CVE-2006-5553
Cisco Security Agent (CSA) for Linux 4.5 prior to 4.5.1.657 and 5.0 prior to 5.0.0.193, as used by Unified CallManager (CUCM) and Unified Presence Server (CUPS), allows remote malicious users to cause a denial of service (resource consumption) via a port scan with certain options...
Cisco Security Agent 4.5.1.639
Cisco Security Agent 5.0
Cisco Unified Presence Server 1.0\\(2\\)
Cisco Unified Callmanager 5.0\\(1\\)
Cisco Unified Callmanager 5.0\\(2\\)
Cisco Unified Callmanager 5.0\\(3\\)
Cisco Unified Callmanager 5.0\\(3a\\)
Cisco Security Agent 4.5
Cisco Security Agent 4.5.1
Cisco Unified Callmanager 5.0\\(4\\)
Cisco Unified Presence Server 1.0
5
CVSSv2
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected ...
Openssl Openssl 1.0.1j
5
CVSSv2
CVE-2015-1794
The ssl3_get_key_exchange function in ssl/s3_clnt.c in OpenSSL 1.0.2 prior to 1.0.2e allows remote servers to cause a denial of service (segmentation fault) via a zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message.
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.2
Openssl Openssl 1.0.2d
1 Article
5
CVSSv2
CVE-2015-3193
The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 prior to 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote malicious users to obt...
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.2
Openssl Openssl 1.0.2d
Nodejs Node.js
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
1 Github repository
5
CVSSv2
CVE-2015-0207
The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 prior to 1.0.2a does not properly isolate the state information of independent data streams, which allows remote malicious users to cause a denial of service (application crash) via crafted DTLS traffic, as demonstrated by DT...
Openssl Openssl 1.0.2
4.3
CVSSv2
CVE-2015-0208
The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c in OpenSSL 1.0.2 prior to 1.0.2a allows remote malicious users to cause a denial of service (NULL pointer dereference and application crash) via crafted RSA PSS parameters to...
Openssl Openssl 1.0.2
6.8
CVSSv2
CVE-2015-0209
Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL prior to 0.9.8zf, 1.0.0 prior to 1.0.0r, 1.0.1 prior to 1.0.1m, and 1.0.2 prior to 1.0.2a might allow remote malicious users to cause a denial of service (memory corruption and applica...
Openssl Openssl 1.0.1j
Openssl Openssl 1.0.0n
Openssl Openssl 1.0.0c
Openssl Openssl 1.0.0i
Openssl Openssl 1.0.1h
Openssl Openssl 1.0.0m
Openssl Openssl 1.0.1c
Openssl Openssl 1.0.1g
Openssl Openssl 1.0.0h
Openssl Openssl 1.0.0e
Openssl Openssl 1.0.0f
Openssl Openssl 1.0.0d
Openssl Openssl 1.0.0j
Openssl Openssl 1.0.0p
Openssl Openssl 1.0.1a
Openssl Openssl 1.0.0o
Openssl Openssl 1.0.1d
Openssl Openssl 1.0.0k
Openssl Openssl 1.0.1k
Openssl Openssl 1.0.0
Openssl Openssl 1.0.1b
Openssl Openssl 1.0.1e
4.3
CVSSv2
CVE-2015-0285
The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 prior to 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote malicious users to defeat cryptographic protection mechanisms by sniffing the network and then...
Openssl Openssl 1.0.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
CVE-2006-4304
CVE-2023-26603
CVE-2024-28327
CVE-2023-50363
CVE-2024-21905
template injection
CVE-2024-3400
cross-site request forgery
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »