Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco security manager 4.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 prior to 1.0.2a allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
Openssl Openssl 1.0.2
3 Github repositories
2 Articles
4.3
CVSSv2
CVE-2015-0285
The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 prior to 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote malicious users to defeat cryptographic protection mechanisms by sniffing the network and then...
Openssl Openssl 1.0.2
5
CVSSv2
CVE-2015-0207
The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 prior to 1.0.2a does not properly isolate the state information of independent data streams, which allows remote malicious users to cause a denial of service (application crash) via crafted DTLS traffic, as demonstrated by DT...
Openssl Openssl 1.0.2
4.3
CVSSv2
CVE-2015-0208
The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c in OpenSSL 1.0.2 prior to 1.0.2a allows remote malicious users to cause a denial of service (NULL pointer dereference and application crash) via crafted RSA PSS parameters to...
Openssl Openssl 1.0.2
6.8
CVSSv2
CVE-2015-0209
Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL prior to 0.9.8zf, 1.0.0 prior to 1.0.0r, 1.0.1 prior to 1.0.1m, and 1.0.2 prior to 1.0.2a might allow remote malicious users to cause a denial of service (memory corruption and applica...
Openssl Openssl 1.0.1j
Openssl Openssl 1.0.0n
Openssl Openssl 1.0.0c
Openssl Openssl 1.0.0i
Openssl Openssl 1.0.1h
Openssl Openssl 1.0.0m
Openssl Openssl 1.0.1c
Openssl Openssl 1.0.1g
Openssl Openssl 1.0.0h
Openssl Openssl 1.0.0e
Openssl Openssl 1.0.0f
Openssl Openssl 1.0.0d
Openssl Openssl 1.0.0j
Openssl Openssl 1.0.0p
Openssl Openssl 1.0.1a
Openssl Openssl 1.0.0o
Openssl Openssl 1.0.1d
Openssl Openssl 1.0.0k
Openssl Openssl 1.0.1k
Openssl Openssl 1.0.0
Openssl Openssl 1.0.1b
Openssl Openssl 1.0.1e
7.1
CVSSv2
CVE-2010-2821
Unspecified vulnerability on the Cisco Firewall Services Module (FWSM) with software 3.2 prior to 3.2(17.2), 4.0 prior to 4.0(11.1), and 4.1 prior to 4.1(1.2) for Catalyst 6500 series switches and 7600 series routers, when multi-mode is enabled, allows remote malicious users to c...
Cisco Firewall Services Module Software 4.0
Cisco Firewall Services Module Software 4.0\\(4\\)
Cisco Firewall Services Module Software 4.0\\(6\\)
Cisco Firewall Services Module Software 4.0\\(7\\)
Cisco Firewall Services Module Software 3.2\\(13\\)
Cisco Firewall Services Module Software 3.2\\(14\\)
Cisco Firewall Services Module Software 3.2\\(16\\)
Cisco Firewall Services Module Software 3.2\\(1\\)
Cisco Firewall Services Module Software 3.2\\(3\\)
Cisco Firewall Services Module Software 4.0\\(8\\)
Cisco Firewall Services Module Software 4.1\\(1\\)
Cisco Firewall Services Module Software 3.2
Cisco Firewall Services Module Software 3.2\\(2\\)
Cisco Firewall Services Module Software 4.0\\(10\\)
Cisco Firewall Services Module Software 4.1
Cisco Firewall Services Module
9
CVSSv2
CVE-2012-4661
Stack-based buffer overflow in the DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 prior to 8.3(2.34), 8.4 prior to 8.4(4.4), 8.5 prior to 8.5(1....
Cisco Adaptive Security Appliance Software 8.3\\(1\\)
Cisco Adaptive Security Appliance Software 8.3\\(2\\)
Cisco Adaptive Security Appliance Software 8.4
Cisco Adaptive Security Appliance Software 8.4\\(1\\)
Cisco Adaptive Security Appliance Software 8.4\\(1.11\\)
Cisco Adaptive Security Appliance Software 8.4\\(2\\)
Cisco Adaptive Security Appliance Software 8.4\\(2.11\\)
Cisco Adaptive Security Appliance Software 8.5
Cisco Adaptive Security Appliance Software 8.5\\(1\\)
Cisco Adaptive Security Appliance Software 8.5\\(1.4\\)
Cisco Adaptive Security Appliance Software 8.6
Cisco Adaptive Security Appliance Software 8.6\\(1\\)
Cisco 5500 Series Adaptive Security Appliance
Cisco 7600 Router
Cisco Catalyst 6500
Cisco Catalyst 6503-e -
Cisco Catalyst 6504-e -
Cisco Catalyst 6506-e -
Cisco Catalyst 6509-e -
Cisco Catalyst 6509-neb-a -
Cisco Catalyst 6509-v-e -
Cisco Catalyst 6513 -
7.1
CVSSv2
CVE-2012-4662
The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 prior to 8.3(2.25), 8.4 prior to 8.4(2.5), and 8.5 prior to 8.5(1.13) and the Firewall Servic...
Cisco Adaptive Security Appliance Software 8.3\\(1\\)
Cisco Adaptive Security Appliance Software 8.3\\(2\\)
Cisco Adaptive Security Appliance Software 8.4
Cisco Adaptive Security Appliance Software 8.4\\(1\\)
Cisco Adaptive Security Appliance Software 8.4\\(1.11\\)
Cisco Adaptive Security Appliance Software 8.4\\(2\\)
Cisco Adaptive Security Appliance Software 8.4\\(2.11\\)
Cisco Adaptive Security Appliance Software 8.5
Cisco Adaptive Security Appliance Software 8.5\\(1\\)
Cisco Adaptive Security Appliance Software 8.5\\(1.4\\)
Cisco 5500 Series Adaptive Security Appliance
Cisco 7600 Router
Cisco Catalyst 6500
Cisco Catalyst 6503-e -
Cisco Catalyst 6504-e -
Cisco Catalyst 6506-e -
Cisco Catalyst 6509-e -
Cisco Catalyst 6509-neb-a -
Cisco Catalyst 6509-v-e -
Cisco Catalyst 6513 -
Cisco Catalyst 6513-e -
7.1
CVSSv2
CVE-2012-4663
The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 prior to 8.3(2.25), 8.4 prior to 8.4(2.5), and 8.5 prior to 8.5(1.13) and the Firewall Servic...
Cisco Adaptive Security Appliance Software 8.3\\(1\\)
Cisco Adaptive Security Appliance Software 8.3\\(2\\)
Cisco Adaptive Security Appliance Software 8.4
Cisco Adaptive Security Appliance Software 8.4\\(1\\)
Cisco Adaptive Security Appliance Software 8.4\\(1.11\\)
Cisco Adaptive Security Appliance Software 8.4\\(2\\)
Cisco Adaptive Security Appliance Software 8.4\\(2.11\\)
Cisco Adaptive Security Appliance Software 8.5
Cisco Adaptive Security Appliance Software 8.5\\(1\\)
Cisco Adaptive Security Appliance Software 8.5\\(1.4\\)
Cisco 5500 Series Adaptive Security Appliance
Cisco 7600 Router
Cisco Catalyst 6500
Cisco Catalyst 6503-e -
Cisco Catalyst 6504-e -
Cisco Catalyst 6506-e -
Cisco Catalyst 6509-e -
Cisco Catalyst 6509-neb-a -
Cisco Catalyst 6509-v-e -
Cisco Catalyst 6513 -
Cisco Catalyst 6513-e -
5
CVSSv2
CVE-2017-3730
In OpenSSL 1.1.0 prior to 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.
Openssl Openssl 1.1.0c
Openssl Openssl 1.1.0
Openssl Openssl 1.1.0b
Openssl Openssl 1.1.0a
Oracle Agile Engineering Data Management 6.2.0
Oracle Jd Edwards World Security A9.2
Oracle Communications Eagle Lnp Application Processor 10.1
Oracle Communications Application Session Controller 3.7.1
Oracle Jd Edwards World Security A9.4
Oracle Jd Edwards Enterpriseone Tools 9.2
Oracle Communications Operations Monitor 3.4
Oracle Communications Operations Monitor 4.0
Oracle Agile Engineering Data Management 6.1.3
Oracle Jd Edwards World Security A9.1
Oracle Jd Edwards World Security A9.3
Oracle Communications Eagle Lnp Application Processor 10.0
Oracle Communications Eagle Lnp Application Processor 10.2
Oracle Communications Application Session Controller 3.8.0
1 EDB exploit
1 Github repository
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »