Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
5500 series adaptive security appliance vulnerabilities and exploits
(subscribe to this query)
632
VMScore
CVE-2010-0566
Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 prior to 7.0(8.10), 7.2 prior to 7.2(4.45), 8.0 prior to 8.0(4.44), 8.1 prior to 8.1(2.35), and 8.2 prior to 8.2(1.10) allows remote malicious users to cause a denial of service (device reload) via...
Cisco Asa 5500 7.1
Cisco Asa 5500 8.0
Cisco Asa 5500 8.1
Cisco Asa 5500 8.2
Cisco Asa 5500 7.2
Cisco Pix 500
445
VMScore
CVE-2010-0567
Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 prior to 7.0(8.10), 7.2 prior to 7.2(4.45), 8.0 prior to 8.0(5.1), 8.1 prior to 8.1(2.37), and 8.2 prior to 8.2(1.15); and Cisco PIX 500 Series Security Appliance; allows remote malicious users to ...
Cisco Asa 5500 8.0
Cisco Asa 5500 8.1
Cisco Asa 5500 8.2
Cisco Pix 500
Cisco Asa 5500 7.2
Cisco Asa 5500 7.1
632
VMScore
CVE-2010-0568
Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 prior to 7.0(8.10), 7.2 prior to 7.2(4.45), 8.0 prior to 8.0(5.7), 8.1 prior to 8.1(2.40), and 8.2 prior to 8.2(2.1); and Cisco PIX 500 Series Security Appliance; allows remote malicious users to b...
Cisco Asa 5500 8.2
Cisco Pix 500
Cisco Asa 5500 8.0
Cisco Asa 5500 8.1
Cisco Asa 5500 7.2
Cisco Asa 5500 7.1
694
VMScore
CVE-2010-0569
Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 prior to 7.0(8.10), 7.2 prior to 7.2(4.45), 8.0 prior to 8.0(5.2), 8.1 prior to 8.1(2.37), and 8.2 prior to 8.2(1.16); and Cisco PIX 500 Series Security Appliance; allows remote malicious users to ...
Cisco Pix 500
Cisco Asa 5500 7.2
Cisco Asa 5500 8.1
Cisco Asa 5500 8.2
Cisco Asa 5500 7.1
Cisco Asa 5500 8.0
694
VMScore
CVE-2011-0395
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 prior to 8.0(5.20), 8.1 prior to 8.1(2.48), 8.2 prior to 8.2(3), and 8.3 prior to 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote malicious users to...
Cisco Adaptive Security Appliance 8.0\\(2\\)
Cisco Adaptive Security Appliance 8.0\\(3\\)
Cisco Adaptive Security Appliance 8.0\\(4\\)
Cisco Adaptive Security Appliance 8.0\\(5\\)
Cisco Adaptive Security Appliance 8.1\\(1\\)
Cisco Adaptive Security Appliance 8.1\\(2\\)
Cisco Adaptive Security Appliance 8.2
Cisco Adaptive Security Appliance 8.2\\(1\\)
Cisco Adaptive Security Appliance 8.2\\(2\\)
Cisco Adaptive Security Appliance 8.3
Cisco Adaptive Security Appliance Software 8.0
Cisco Adaptive Security Appliance Software 8.3\\(1\\)
Cisco Asa 5500
Cisco Asa 5505
Cisco Asa 5510
Cisco Asa 5520
Cisco Asa 5540
Cisco Asa 5550
Cisco Asa 5580
Cisco Pix 500
Cisco Pix 501
Cisco Pix 506e
694
VMScore
CVE-2011-0396
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 prior to 8.0(5.23), 8.1 prior to 8.1(2.49), 8.2 prior to 8.2(4.1), and 8.3 prior to 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote malicious users to read arbitrary files via ...
Cisco Adaptive Security Appliance 8.0\\(2\\)
Cisco Adaptive Security Appliance 8.0\\(3\\)
Cisco Adaptive Security Appliance 8.0\\(4\\)
Cisco Adaptive Security Appliance 8.0\\(5\\)
Cisco Adaptive Security Appliance 8.1\\(1\\)
Cisco Adaptive Security Appliance 8.1\\(2\\)
Cisco Adaptive Security Appliance 8.2
Cisco Adaptive Security Appliance 8.2\\(1\\)
Cisco Adaptive Security Appliance 8.2\\(2\\)
Cisco Adaptive Security Appliance 8.3
Cisco Adaptive Security Appliance Software 8.0
Cisco Adaptive Security Appliance Software 8.3\\(1\\)
Cisco Asa 5500
Cisco Asa 5505
Cisco Asa 5510
Cisco Asa 5520
Cisco Asa 5540
Cisco Asa 5550
Cisco Asa 5580
Cisco Pix 500
Cisco Pix 501
Cisco Pix 506e
641
VMScore
CVE-2018-0453
A vulnerability in the Sourcefire tunnel control channel protocol in Cisco Firepower System Software running on Cisco Firepower Threat Defense (FTD) sensors could allow an authenticated, local malicious user to execute specific CLI commands with root privileges on the Cisco Firep...
Cisco Firepower Threat Defense 6.0.1
Cisco Firepower Threat Defense 6.2.0
Cisco Firepower Threat Defense 6.2.1
Cisco Firepower Threat Defense 6.2.2
Cisco Firepower Threat Defense 6.0.0
Cisco Firepower Threat Defense 6.1.0
Cisco Firepower Threat Defense 5.4.0
694
VMScore
CVE-2018-0240
Multiple vulnerabilities in the Application Layer Protocol Inspection feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote malicious user to trigger a reload of an affected device, res...
Cisco Firepower Threat Defense
Cisco Adaptive Security Appliance Software
445
VMScore
CVE-2016-6368
A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition due to the Snort process unexpectedly resta...
Cisco Firepower Management Center 6.0.0.0
Cisco Firepower Management Center 6.0.0
Cisco Firepower Management Center 6.0.0.1
Cisco Firepower Management Center 6.0.1
445
VMScore
CVE-2018-0455
A vulnerability in the Server Message Block Version 2 (SMBv2) and Version 3 (SMBv3) protocol implementation for the Cisco Firepower System Software could allow an unauthenticated, remote malicious user to cause the device to run low on system memory, possibly preventing the devic...
Cisco Firepower System Software 6.0.1
Cisco Firepower System Software 6.2.1
Cisco Firepower System Software 6.1.0
Cisco Firepower System Software 6.2.0.2
Cisco Firepower System Software 6.2.2
Cisco Firepower System Software 6.0
Cisco Firepower System Software 6.2.0
Cisco Firepower System Software 6.2.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »