Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco asa 5500 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2018-15462
A vulnerability in the TCP ingress handler for the data interfaces that are configured with management access to Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote malicious user to cause an increase in CPU and memory usage, resulting in a denial...
Cisco Firepower Threat Defense
7.5
CVSSv3
CVE-2019-1687
A vulnerability in the TCP proxy functionality for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote malicious user to cause the device to restart unexpectedly, resulting in a denial of servic...
Cisco Adaptive Security Appliance Software
Cisco Firepower Threat Defense
7.5
CVSSv3
CVE-2018-0455
A vulnerability in the Server Message Block Version 2 (SMBv2) and Version 3 (SMBv3) protocol implementation for the Cisco Firepower System Software could allow an unauthenticated, remote malicious user to cause the device to run low on system memory, possibly preventing the devic...
Cisco Firepower System Software 6.1.0
Cisco Firepower System Software 6.2.0.2
Cisco Firepower System Software 6.2.2
Cisco Firepower System Software 6.2.3
Cisco Firepower System Software 6.0
Cisco Firepower System Software 6.0.1
Cisco Firepower System Software 6.2.0
Cisco Firepower System Software 6.2.1
7.5
CVSSv3
CVE-2018-0296
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote malicious user to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software ...
Cisco Adaptive Security Appliance Software 8.1(2.5)
Cisco Adaptive Security Appliance Software
Cisco Firepower Threat Defense 6.2.3
Cisco Firepower Threat Defense
Cisco Firepower Threat Defense 6.2.3.1
Cisco Firepower Threat Defense 6.2.3-851
Cisco Firepower Threat Defense 6.2.3-85.02
2 EDB exploits
12 Github repositories
1 Article
7.5
CVSSv3
CVE-2018-0227
A vulnerability in the Secure Sockets Layer (SSL) Virtual Private Network (VPN) Client Certificate Authentication feature for Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote malicious user to establish an SSL VPN connection and bypass certain SSL ce...
Cisco Adaptive Security Appliance Software
Cisco Adaptive Security Appliance Software 9.5.2.7
Cisco Adaptive Security Appliance Software 9.5.2.8
Cisco Adaptive Security Appliance Software 9.4.3.1
Cisco Adaptive Security Appliance Software 9.4.3.2
Cisco Firepower Threat Defense
7.5
CVSSv3
CVE-2016-1312
The HTTPS inspection engine in the Content Security and Control Security Services Module (CSC-SSM) 6.6 prior to 6.6.1164.0 for Cisco ASA 5500 devices allows remote malicious users to cause a denial of service (memory consumption or device reload) via a flood of HTTPS packets, aka...
Cisco Asa 5500 Csc-ssm Firmware 6.6.1125.0
7.4
CVSSv3
CVE-2019-1696
Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote malicious user to cause a denial of service (DoS) condition. For more information...
Cisco Firepower Management Center 2.9.10
Cisco Firepower Management Center 2.9.11
Cisco Firepower Management Center 2.9.12
Cisco Firepower Management Center 2.9.9
Cisco Firepower Management Center 2.9.8
Cisco Firepower Management Center 2.9.13
Cisco Firepower Threat Defense
6.8
CVSSv3
CVE-2018-15390
A vulnerability in the FTP inspection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote malicious user to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because the affect...
Cisco Firepower Threat Defense
6.8
CVSSv3
CVE-2017-13084
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Debian Debian Linux 8.0
Freebsd Freebsd
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Opensuse Leap 42.3
Opensuse Leap 42.2
Redhat Enterprise Linux Server 7
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Freebsd Freebsd 10
Freebsd Freebsd 10.4
W1.fi Hostapd 1.1
W1.fi Hostapd 2.4
W1.fi Hostapd 2.0
W1.fi Hostapd 0.7.3
W1.fi Wpa Supplicant 2.3
W1.fi Wpa Supplicant 2.1
W1.fi Wpa Supplicant 2.2
W1.fi Hostapd 1.0
1 Article
6.7
CVSSv3
CVE-2019-1649
A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local malicious user to write a modified firmware image to the component. This vulnerability affects mul...
Cisco Asa 5500 Firmware
Cisco Firepower 2100 Firmware
Cisco Firepower 4000 Firmware
Cisco Firepower 9000 Firmware
Cisco Ons 15454 Mstp Firmware
Cisco Analog Voice Network Interface Modules Firmware
Cisco Integrated Services Router T1/e1 Voice And Wan Network Interface Modules Firmware
Cisco Supervisor A+ Firmware
Cisco Supervisor B+ Firmware
Cisco 15454-m-wse-k9 Firmware
Cisco Ios Xe
Cisco Ios
Cisco Industrial Security Appliances 3000 Firmware
Cisco Integrated Services Router 4200 Firmware
Cisco Integrated Services Router 4300 Firmware
Cisco Integrated Services Router 4400 Firmware
Cisco Asr 1000 Series Firmware
Cisco Asr 1001 Firmware 16.0.0
Cisco Ios Xr 7.0.1
Cisco Catalyst 9800-40 Wireless Controller Firmware -
Cisco Catalyst 9800-80 Wireless Controller Firmware -
Cisco Ic3000-k9 Firmware
2 Articles
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-38627
CVE-2022-45803
CVE-2024-38319
camera
template injection
CVE-2024-27801
CVE-2024-0762
CVE-2024-5791
unauthorized
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »