Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
link column vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2018-0296
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote malicious user to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software ...
Cisco Adaptive Security Appliance Software 8.1\\(2.5\\)
Cisco Adaptive Security Appliance Software
Cisco Firepower Threat Defense 6.2.3
Cisco Firepower Threat Defense
Cisco Firepower Threat Defense 6.2.3.1
Cisco Firepower Threat Defense 6.2.3-851
Cisco Firepower Threat Defense 6.2.3-85.02
2 EDB exploits
11 Github repositories
1 Article
7.8
CVSSv2
CVE-2012-4620
Cisco IOS 12.2 and 15.0 up to and including 15.2 on Cisco 10000 series routers, when a tunnel interface exists, allows remote malicious users to cause a denial of service (interface queue wedge) via tunneled (1) GRE/IP, (2) IPIP, or (3) IPv6 in IPv4 packets, aka Bug ID CSCts66808...
Cisco 10008 Router
Cisco Ios 15.2
Cisco Ios 15.1
Cisco Ios 12.2
Cisco Ios 15.0
Cisco Ios 15.0\\(1\\)se
NA
CVE-2023-20243
A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote malicious user to cause the affected system to stop processing RADIUS packets. This vulnerability is due to improper handling of certain RADIUS ...
Cisco Identity Services Engine 3.1
Cisco Identity Services Engine 3.2
7.8
CVSSv2
CVE-2018-0472
A vulnerability in the IPsec driver code of multiple Cisco IOS XE Software platforms and the Cisco ASA 5500-X Series Adaptive Security Appliance (ASA) could allow an unauthenticated, remote malicious user to cause the device to reload. The vulnerability is due to improper process...
Cisco Ios Xe 16.8.1
Cisco Ios Xe 15.5\\(3\\)s5.36
7.1
CVSSv2
CVE-2012-3950
The Intrusion Prevention System (IPS) feature in Cisco IOS 12.3 up to and including 12.4 and 15.0 up to and including 15.2, in certain configurations of enabled categories and missing signatures, allows remote malicious users to cause a denial of service (device reload) via DNS p...
Cisco Ios 12.3\\(3h\\)
Cisco Ios 12.3\\(3e\\)
Cisco Ios 12.3\\(2\\)xa5
Cisco Ios 12.3\\(2\\)xa4
Cisco Ios 12.3\\(2\\)ja
Cisco Ios 12.3\\(15b\\)
Cisco Ios 12.3\\(16\\)
Cisco Ios 12.3\\(14\\)yq1
Cisco Ios 12.3\\(14\\)yq3
Cisco Ios 12.3\\(14\\)t2
Cisco Ios 12.3\\(14\\)t
Cisco Ios 12.3\\(12\\)
Cisco Ios 12.3\\(11\\)yn
Cisco Ios 12.3\\(11\\)yf2
Cisco Ios 12.3\\(11\\)yf3
Cisco Ios 12.3\\(10e\\)
Cisco Ios 12.3\\(4\\)eo1
Cisco Ios 12.3\\(3i\\)
Cisco Ios 12.3\\(2\\)xc2
Cisco Ios 12.3\\(2\\)xc1
Cisco Ios 12.3\\(2\\)jk
Cisco Ios 12.3\\(1a\\)
6.1
CVSSv2
CVE-2019-1849
A vulnerability in the Border Gateway Patrol (BGP) Multiprotocol Label Switching (MPLS)-based Ethernet VPN (EVPN) implementation of Cisco IOS XR Software could allow an unauthenticated, adjacent malicious user to trigger a denial of service (DoS) condition on an affected device. ...
Cisco Ios Xr
7.1
CVSSv2
CVE-2014-0710
Race condition in the cut-through proxy feature in Cisco Firewall Services Module (FWSM) Software 3.x prior to 3.2(28) and 4.x prior to 4.1(15) allows remote malicious users to cause a denial of service (device reload) via certain matching traffic, aka Bug ID CSCuj16824.
Cisco Firewall Services Module Software 3.1\\(12\\)
Cisco Firewall Services Module Software 3.1\\(13\\)
Cisco Firewall Services Module Software 3.1\\(14\\)
Cisco Firewall Services Module Software 3.1\\(15\\)
Cisco Firewall Services Module Software 3.1\\(8\\)
Cisco Firewall Services Module Software 3.1\\(9\\)
Cisco Firewall Services Module Software 3.2
Cisco Firewall Services Module Software 3.2\\(1\\)
Cisco Firewall Services Module Software 3.2\\(10\\)
Cisco Firewall Services Module Software 3.2\\(22\\)
Cisco Firewall Services Module Software 3.2\\(23\\)
Cisco Firewall Services Module Software 3.2\\(24\\)
Cisco Firewall Services Module Software 3.2\\(25\\)
Cisco Firewall Services Module Software 3.1\\(10\\)
Cisco Firewall Services Module Software 3.1\\(17\\)
Cisco Firewall Services Module Software 3.1\\(19\\)
Cisco Firewall Services Module Software 3.1\\(4\\)
Cisco Firewall Services Module Software 3.1\\(6\\)
Cisco Firewall Services Module Software 3.2\\(11\\)
Cisco Firewall Services Module Software 3.2\\(13\\)
Cisco Firewall Services Module Software 3.2\\(2\\)
Cisco Firewall Services Module Software 3.2\\(21\\)
9
CVSSv2
CVE-2012-4661
Stack-based buffer overflow in the DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 prior to 8.3(2.34), 8.4 prior to 8.4(4.4), 8.5 prior to 8.5(1....
Cisco Adaptive Security Appliance Software 8.3\\(1\\)
Cisco Adaptive Security Appliance Software 8.3\\(2\\)
Cisco Adaptive Security Appliance Software 8.4
Cisco Adaptive Security Appliance Software 8.4\\(1\\)
Cisco Adaptive Security Appliance Software 8.4\\(1.11\\)
Cisco Adaptive Security Appliance Software 8.4\\(2\\)
Cisco Adaptive Security Appliance Software 8.4\\(2.11\\)
Cisco Adaptive Security Appliance Software 8.5
Cisco Adaptive Security Appliance Software 8.5\\(1\\)
Cisco Adaptive Security Appliance Software 8.5\\(1.4\\)
Cisco Adaptive Security Appliance Software 8.6
Cisco Adaptive Security Appliance Software 8.6\\(1\\)
Cisco 5500 Series Adaptive Security Appliance
Cisco 7600 Router
Cisco Catalyst 6500
Cisco Catalyst 6503-e -
Cisco Catalyst 6504-e -
Cisco Catalyst 6506-e -
Cisco Catalyst 6509-e -
Cisco Catalyst 6509-neb-a -
Cisco Catalyst 6509-v-e -
Cisco Catalyst 6513 -
7.1
CVSSv2
CVE-2012-4662
The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 prior to 8.3(2.25), 8.4 prior to 8.4(2.5), and 8.5 prior to 8.5(1.13) and the Firewall Servic...
Cisco Adaptive Security Appliance Software 8.3\\(1\\)
Cisco Adaptive Security Appliance Software 8.3\\(2\\)
Cisco Adaptive Security Appliance Software 8.4
Cisco Adaptive Security Appliance Software 8.4\\(1\\)
Cisco Adaptive Security Appliance Software 8.4\\(1.11\\)
Cisco Adaptive Security Appliance Software 8.4\\(2\\)
Cisco Adaptive Security Appliance Software 8.4\\(2.11\\)
Cisco Adaptive Security Appliance Software 8.5
Cisco Adaptive Security Appliance Software 8.5\\(1\\)
Cisco Adaptive Security Appliance Software 8.5\\(1.4\\)
Cisco 5500 Series Adaptive Security Appliance
Cisco 7600 Router
Cisco Catalyst 6500
Cisco Catalyst 6503-e -
Cisco Catalyst 6504-e -
Cisco Catalyst 6506-e -
Cisco Catalyst 6509-e -
Cisco Catalyst 6509-neb-a -
Cisco Catalyst 6509-v-e -
Cisco Catalyst 6513 -
Cisco Catalyst 6513-e -
7.1
CVSSv2
CVE-2012-4663
The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 prior to 8.3(2.25), 8.4 prior to 8.4(2.5), and 8.5 prior to 8.5(1.13) and the Firewall Servic...
Cisco Adaptive Security Appliance Software 8.3\\(1\\)
Cisco Adaptive Security Appliance Software 8.3\\(2\\)
Cisco Adaptive Security Appliance Software 8.4
Cisco Adaptive Security Appliance Software 8.4\\(1\\)
Cisco Adaptive Security Appliance Software 8.4\\(1.11\\)
Cisco Adaptive Security Appliance Software 8.4\\(2\\)
Cisco Adaptive Security Appliance Software 8.4\\(2.11\\)
Cisco Adaptive Security Appliance Software 8.5
Cisco Adaptive Security Appliance Software 8.5\\(1\\)
Cisco Adaptive Security Appliance Software 8.5\\(1.4\\)
Cisco 5500 Series Adaptive Security Appliance
Cisco 7600 Router
Cisco Catalyst 6500
Cisco Catalyst 6503-e -
Cisco Catalyst 6504-e -
Cisco Catalyst 6506-e -
Cisco Catalyst 6509-e -
Cisco Catalyst 6509-neb-a -
Cisco Catalyst 6509-v-e -
Cisco Catalyst 6513 -
Cisco Catalyst 6513-e -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2024-34413
CVE-2024-34089
CVE-2024-33408
local
SQL
CVE-2024-0402
CVE-2024-33910
CVE-2024-31848
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »