Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
5500 series adaptive security appliance vulnerabilities and exploits
(subscribe to this query)
7.1
CVSSv2
CVE-2010-0566
Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 prior to 7.0(8.10), 7.2 prior to 7.2(4.45), 8.0 prior to 8.0(4.44), 8.1 prior to 8.1(2.35), and 8.2 prior to 8.2(1.10) allows remote malicious users to cause a denial of service (device reload) via...
Cisco Asa 5500 7.1
Cisco Asa 5500 8.0
Cisco Asa 5500 8.1
Cisco Asa 5500 8.2
Cisco Asa 5500 7.2
Cisco Pix 500
5
CVSSv2
CVE-2010-0567
Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 prior to 7.0(8.10), 7.2 prior to 7.2(4.45), 8.0 prior to 8.0(5.1), 8.1 prior to 8.1(2.37), and 8.2 prior to 8.2(1.15); and Cisco PIX 500 Series Security Appliance; allows remote malicious users to ...
Cisco Asa 5500 8.0
Cisco Asa 5500 8.1
Cisco Asa 5500 8.2
Cisco Pix 500
Cisco Asa 5500 7.2
Cisco Asa 5500 7.1
7.8
CVSSv2
CVE-2010-0149
Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.2 prior to 7.2(4.46), 8.0 prior to 8.0(4.38), 8.1 prior to 8.1(2.29), and 8.2 prior to 8.2(1.5); and Cisco PIX 500 Series Security Appliance; allows remote malicious users to cause a denial of servic...
Cisco Asa 5500 8.2
Cisco Pix 500
Cisco Asa 5500 8.0
Cisco Asa 5500 8.1
Cisco Asa 5500 7.2
Cisco Asa 5500 7.1
7.8
CVSSv2
CVE-2010-0150
Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 prior to 7.0(8.10), 7.2 prior to 7.2(4.45), 8.0 prior to 8.0(5.2), 8.1 prior to 8.1(2.37), and 8.2 prior to 8.2(1.16); and Cisco PIX 500 Series Security Appliance; allows remote malicious users to ...
Cisco Asa 5500 7.2
Cisco Asa 5500 7.1
Cisco Asa 5500 8.2
Cisco Pix 500
Cisco Asa 5500 8.0
Cisco Asa 5500 8.1
7.8
CVSSv2
CVE-2011-0395
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 prior to 8.0(5.20), 8.1 prior to 8.1(2.48), 8.2 prior to 8.2(3), and 8.3 prior to 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote malicious users to...
Cisco Adaptive Security Appliance 8.0\\(2\\)
Cisco Adaptive Security Appliance 8.0\\(3\\)
Cisco Adaptive Security Appliance 8.0\\(4\\)
Cisco Adaptive Security Appliance 8.0\\(5\\)
Cisco Adaptive Security Appliance 8.1\\(1\\)
Cisco Adaptive Security Appliance 8.1\\(2\\)
Cisco Adaptive Security Appliance 8.2
Cisco Adaptive Security Appliance 8.2\\(1\\)
Cisco Adaptive Security Appliance 8.2\\(2\\)
Cisco Adaptive Security Appliance 8.3
Cisco Adaptive Security Appliance Software 8.0
Cisco Adaptive Security Appliance Software 8.3\\(1\\)
Cisco Asa 5500
Cisco Asa 5505
Cisco Asa 5510
Cisco Asa 5520
Cisco Asa 5540
Cisco Asa 5550
Cisco Asa 5580
Cisco Pix 500
Cisco Pix 501
Cisco Pix 506e
7.8
CVSSv2
CVE-2011-0396
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 prior to 8.0(5.23), 8.1 prior to 8.1(2.49), 8.2 prior to 8.2(4.1), and 8.3 prior to 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote malicious users to read arbitrary files via ...
Cisco Adaptive Security Appliance 8.0\\(2\\)
Cisco Adaptive Security Appliance 8.0\\(3\\)
Cisco Adaptive Security Appliance 8.0\\(4\\)
Cisco Adaptive Security Appliance 8.0\\(5\\)
Cisco Adaptive Security Appliance 8.1\\(1\\)
Cisco Adaptive Security Appliance 8.1\\(2\\)
Cisco Adaptive Security Appliance 8.2
Cisco Adaptive Security Appliance 8.2\\(1\\)
Cisco Adaptive Security Appliance 8.2\\(2\\)
Cisco Adaptive Security Appliance 8.3
Cisco Adaptive Security Appliance Software 8.0
Cisco Adaptive Security Appliance Software 8.3\\(1\\)
Cisco Asa 5500
Cisco Asa 5505
Cisco Asa 5510
Cisco Asa 5520
Cisco Asa 5540
Cisco Asa 5550
Cisco Asa 5580
Cisco Pix 500
Cisco Pix 501
Cisco Pix 506e
7.2
CVSSv2
CVE-2018-0453
A vulnerability in the Sourcefire tunnel control channel protocol in Cisco Firepower System Software running on Cisco Firepower Threat Defense (FTD) sensors could allow an authenticated, local malicious user to execute specific CLI commands with root privileges on the Cisco Firep...
Cisco Firepower Threat Defense 6.0.1
Cisco Firepower Threat Defense 6.2.0
Cisco Firepower Threat Defense 6.2.1
Cisco Firepower Threat Defense 6.2.2
Cisco Firepower Threat Defense 6.0.0
Cisco Firepower Threat Defense 6.1.0
Cisco Firepower Threat Defense 5.4.0
7.8
CVSSv2
CVE-2018-0240
Multiple vulnerabilities in the Application Layer Protocol Inspection feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote malicious user to trigger a reload of an affected device, res...
Cisco Firepower Threat Defense
Cisco Adaptive Security Appliance Software
5
CVSSv2
CVE-2016-6368
A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition due to the Snort process unexpectedly resta...
Cisco Firepower Management Center 6.0.0.0
Cisco Firepower Management Center 6.0.0
Cisco Firepower Management Center 6.0.0.1
Cisco Firepower Management Center 6.0.1
5
CVSSv2
CVE-2018-0455
A vulnerability in the Server Message Block Version 2 (SMBv2) and Version 3 (SMBv3) protocol implementation for the Cisco Firepower System Software could allow an unauthenticated, remote malicious user to cause the device to run low on system memory, possibly preventing the devic...
Cisco Firepower System Software 6.0.1
Cisco Firepower System Software 6.2.1
Cisco Firepower System Software 6.1.0
Cisco Firepower System Software 6.2.0.2
Cisco Firepower System Software 6.2.2
Cisco Firepower System Software 6.0
Cisco Firepower System Software 6.2.0
Cisco Firepower System Software 6.2.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »