Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco pix firewall software 4.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-1022
The mailguard feature in Cisco Secure PIX Firewall 5.2(2) and previous versions does not properly restrict access to SMTP commands, which allows remote malicious users to execute restricted commands by sending a DATA command before sending the restricted commands.
Cisco Pix Firewall Software 5.2
Cisco Pix Firewall Software 4.3
Cisco Pix Firewall Software 4.2(1)
Cisco Pix Firewall Software 4.4(4)
Cisco Pix Firewall Software 5.1
Cisco Pix Firewall Software 4.2(5)
Cisco Pix Firewall Software 4.2(2)
Cisco Pix Firewall Software 5.0
1 EDB exploit
NA
CVE-2000-0150
Check Point Firewall-1 allows remote malicious users to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
Cisco Pix Firewall Software 4.1(6)
Cisco Pix Firewall Software 4.1(6b)
Cisco Pix Firewall Software 4.3
Cisco Pix Firewall Software 4.2(1)
Cisco Pix Firewall Software 4.4(4)
Cisco Pix Firewall Software 4.2(2)
Cisco Pix Firewall Software 5.0
NA
CVE-2006-0515
Cisco PIX/ASA 7.1.x prior to 7.1(2) and 7.0.x prior to 7.0(5), PIX 6.3.x prior to 6.3.5(112), and FWSM 2.3.x prior to 2.3(4) and 3.x prior to 3.1(7), when used with Websense/N2H2, allows remote malicious users to bypass HTTP access restrictions by splitting the GET method of an H...
Cisco Adaptive Security Appliance Software 7.0
Cisco Adaptive Security Appliance Software 7.0(4)
Cisco Adaptive Security Appliance Software 7.0.1.4
Cisco Adaptive Security Appliance Software 7.0.4.3
Cisco Pix Firewall 6.2.2.111
Cisco Pix Firewall 6.2.3 (110)
Cisco Pix Firewall 6.3.3 (133)
Cisco Firewall Services Module 2.3
Cisco Firewall Services Module 3.1
Cisco Pix Firewall 6.1.5(104)
Cisco Pix Firewall Software 2.7
Cisco Pix Firewall Software 3.0
Cisco Pix Firewall Software 3.1
Cisco Pix Firewall Software 4.0
Cisco Pix Firewall Software 4.1(6)
Cisco Pix Firewall Software 4.1(6b)
Cisco Pix Firewall Software 4.2
Cisco Pix Firewall Software 4.2(1)
Cisco Pix Firewall Software 4.2(2)
Cisco Pix Firewall Software 4.2(5)
Cisco Pix Firewall Software 4.3
Cisco Pix Firewall Software 4.4
1 EDB exploit
NA
CVE-1999-0158
Cisco PIX firewall manager (PFM) on Windows NT allows malicious users to connect to port 8080 on the PFM server and retrieve any file whose name and location is known.
Cisco Pix Firewall Software 4.1(6)
Cisco Pix Firewall Software 4.2(1)
NA
CVE-2006-3906
Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote malicious users to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOT...
Cisco Ios
Cisco Vpn 3001 Concentrator
Cisco Vpn 3015 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3080 Concentrator
Cisco Adaptive Security Appliance Software 7.0
Cisco Adaptive Security Appliance Software 7.0(4)
Cisco Adaptive Security Appliance Software 7.0(5)
Cisco Adaptive Security Appliance Software 7.0.1.4
Cisco Adaptive Security Appliance Software 7.0.4.3
Cisco Adaptive Security Appliance Software 7.1(2)
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
NA
CVE-2005-4499
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote malicious u...
Cisco Vpn 3001 Concentrator
Cisco Vpn 3015 Concentrator
Cisco Vpn 3020 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3060 Concentrator
Cisco Vpn 3080 Concentrator
Cisco Adaptive Security Appliance Software 7.0
Cisco Adaptive Security Appliance Software 7.0(4)
Cisco Adaptive Security Appliance Software 7.0.1.4
Cisco Adaptive Security Appliance Software 7.0.4.3
Cisco Vpn 3000 Concentrator Series Software 2.0
Cisco Vpn 3000 Concentrator Series Software 2.5.2.a
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.0.3.a
Cisco Vpn 3000 Concentrator Series Software 3.0.3.b
Cisco Vpn 3000 Concentrator Series Software 3.0.4
Cisco Vpn 3000 Concentrator Series Software 3.1
Cisco Vpn 3000 Concentrator Series Software 3.1(rel)
NA
CVE-1999-0157
Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service.
Cisco Ios 11.2p
Cisco Ios 11.3t
Cisco Ios 12.0
Cisco Ios 12.0t
Cisco Pix Firewall Software 4.2(1)
NA
CVE-2005-3669
Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in multiple Cisco products allow remote malicious users to cause a denial of service (device reset) via certain malformed IKE packets, as demonstrated by the PROTOS ISAKMP Test Suit...
Cisco Firewall Services Module
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1.2
Cisco Firewall Services Module 1.1 (3.005)
Cisco Firewall Services Module 2.1 (0.208)
Cisco Vpn 3000 Concentrator Series Software 2.5.2.b
Cisco Vpn 3000 Concentrator Series Software 2.5.2.c
Cisco Vpn 3000 Concentrator Series Software 2.5.2.d
Cisco Vpn 3000 Concentrator Series Software 2.5.2.f
Cisco Vpn 3000 Concentrator Series Software 3.0
Cisco Vpn 3000 Concentrator Series Software 3.5.2
Cisco Vpn 3000 Concentrator Series Software 3.5.3
Cisco Vpn 3000 Concentrator Series Software 3.5.4
Cisco Vpn 3000 Concentrator Series Software 3.5.5
Cisco Vpn 3000 Concentrator Series Software 4.1.5.b
Cisco Vpn 3000 Concentrator Series Software 4.1.7.a
Cisco Vpn 3000 Concentrator Series Software 4.1.7.b
Cisco Vpn 3000 Concentrator Series Software 4.7.1
Cisco Vpn 3000 Concentrator Series Software 4.7.1.f
Cisco Vpn 3000 Concentrator Series Software 3.1
Cisco Vpn 3000 Concentrator Series Software 3.1(rel)
Cisco Vpn 3000 Concentrator Series Software 3.1.1
NA
CVE-2003-1109
The Session Initiation Protocol (SIP) implementation in multiple Cisco products including IP Phone models 7940 and 7960, IOS versions in the 12.2 train, and Secure PIX 5.2.9 to 6.2.2 allows remote malicious users to cause a denial of service and possibly execute arbitrary code vi...
Cisco Ios 12.2(1)xa
Cisco Ios 12.2(1)xd
Cisco Ios 12.2(1)xd1
Cisco Ios 12.2(1)xd3
Cisco Ios 12.2(1)xd4
Cisco Ios 12.2(1)xe
Cisco Ios 12.2(1)xe2
Cisco Ios 12.2(1)xe3
Cisco Ios 12.2(1)xh
Cisco Ios 12.2(1)xq
Cisco Ios 12.2(1)xs
Cisco Ios 12.2(1)xs1
Cisco Ios 12.2(2)t4
Cisco Ios 12.2(2)xa
Cisco Ios 12.2(2)xa1
Cisco Ios 12.2(2)xa5
Cisco Ios 12.2(2)xb
Cisco Ios 12.2(2)xb3
Cisco Ios 12.2(2)xb4
Cisco Ios 12.2(2)xf
Cisco Ios 12.2(2)xg
Cisco Ios 12.2(2)xh
NA
CVE-2003-1112
The Session Initiation Protocol (SIP) implementation in Ingate Firewall and Ingate SIParator prior to 3.1.3 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test...
Ingate Ingate Siparator
Ingate Ingate Firewall
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »