Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco pix vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2008-3815
Unspecified vulnerability in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.0 prior to 7.0(8)3, 7.1 prior to 7.1(2)78, 7.2 prior to 7.2(4)16, 8.0 prior to 8.0(4)6, and 8.1 prior to 8.1(1)13, when configured as a VPN using Microsoft Windows NT D...
Cisco Pix 7.1
Cisco Pix 7.2
Cisco Asa 5500
Cisco Pix 7.0
Cisco Pix 8.0
Cisco Pix 8.1
445
VMScore
CVE-2006-4194
Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote malicious users to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032. NOTE: th...
Cisco Pix Firewall 501
Cisco Pix Firewall 515
Cisco Pix Firewall 525
Cisco Pix Firewall 520
Cisco Pix Firewall 515e
Cisco Pix Firewall 535
Cisco Pix Firewall 506
Cisco Pix Firewall Software 6.3
605
VMScore
CVE-2006-4312
Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable passwor...
Cisco Pix Firewall 525
Cisco Pix Firewall 535
Cisco Pix Firewall 506
Cisco Pix Firewall 515
Cisco Pix Firewall Software 6.3
Cisco Pix Firewall 501
Cisco Pix Firewall 515e
Cisco Pix Firewall 520
Cisco Adaptive Security Appliance
445
VMScore
CVE-2002-2140
Buffer overflow in Cisco PIX Firewall 5.2.x to 5.2.8, 6.0.x to 6.0.3, 6.1.x to 6.1.3, and 6.2.x to 6.2.1 allows remote malicious users to cause a denial of service via HTTP traffic authentication using (1) TACACS+ or (2) RADIUS.
Cisco Pix Firewall Software 6.0\\(3\\)
Cisco Pix Firewall Software 6.1
Cisco Pix Firewall Software 6.1\\(1\\)
Cisco Pix Firewall Software 6.1\\(2\\)
Cisco Pix Firewall Software 6.1\\(3\\)
Cisco Pix Firewall Software 5.2\\(4\\)
Cisco Pix Firewall Software 5.2\\(5\\)
Cisco Pix Firewall Software 5.2\\(6\\)
Cisco Pix Firewall Software 5.2\\(7\\)
Cisco Pix Firewall Software 5.2\\(1\\)
Cisco Pix Firewall Software 5.2\\(3\\)
Cisco Pix Firewall Software 5.2\\(8\\)
Cisco Pix Firewall Software 6.0\\(1\\)
Cisco Pix Firewall Software 6.2
Cisco Pix Firewall Software 5.2
Cisco Pix Firewall Software 5.2\\(2\\)
Cisco Pix Firewall Software 6.0
Cisco Pix Firewall Software 6.0\\(2\\)
Cisco Pix Firewall Software 6.2\\(1\\)
755
VMScore
CVE-2000-1022
The mailguard feature in Cisco Secure PIX Firewall 5.2(2) and previous versions does not properly restrict access to SMTP commands, which allows remote malicious users to execute restricted commands by sending a DATA command before sending the restricted commands.
Cisco Pix Firewall Software 5.1
Cisco Pix Firewall Software 5.2
Cisco Pix Firewall Software 4.2\\(1\\)
Cisco Pix Firewall Software 4.2\\(2\\)
Cisco Pix Firewall Software 4.2\\(5\\)
Cisco Pix Firewall Software 4.3
Cisco Pix Firewall Software 4.4\\(4\\)
Cisco Pix Firewall Software 5.0
1 EDB exploit
570
VMScore
CVE-2002-2139
Cisco PIX Firewall 6.0.3 and previous versions, and 6.1.x to 6.1.3, do not delete the duplicate ISAKMP SAs for a user's VPN session, which allows local users to hijack a session via a man-in-the-middle attack.
Cisco Pix Firewall Software 6.1
Cisco Pix Firewall Software 6.1\\(2\\)
Cisco Pix Firewall Software 6.1\\(3\\)
Cisco Pix Firewall Software 6.0
Cisco Pix Firewall Software 6.0\\(2\\)
Cisco Pix Firewall Software 6.0\\(1\\)
Cisco Pix Firewall Software 6.0\\(3\\)
510
VMScore
CVE-2005-3774
Cisco PIX 6.3 and 7.0 allows remote malicious users to cause a denial of service (blocked new connections) via spoofed TCP packets that cause the PIX to create embryonic connections that that would not produce a valid connection with the end system, including (1) SYN packets with...
Cisco Pix 6.3
Cisco Pix 7.0
2 EDB exploits
694
VMScore
CVE-2003-1003
Cisco PIX firewall 5.x.x, and 6.3.1 and previous versions, allows remote malicious users to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.
Cisco Pix Firewall Software 5.1
Cisco Pix Firewall Software 5.1\\(4.206\\)
Cisco Pix Firewall Software 5.2\\(7\\)
Cisco Pix Firewall Software 5.3
Cisco Pix Firewall Software 6.0
Cisco Pix Firewall Software 6.0\\(2\\)
Cisco Pix Firewall Software 6.0\\(4\\)
Cisco Pix Firewall Software 6.1\\(3\\)
Cisco Pix Firewall Software 6.1\\(5\\)
Cisco Pix Firewall Software 6.3\\(1\\)
Cisco Pix Firewall 6.2.2 .111
Cisco Pix Firewall Software 5.0
Cisco Pix Firewall Software 5.3\\(1\\)
Cisco Pix Firewall Software 5.3\\(1.200\\)
Cisco Pix Firewall Software 5.3\\(2\\)
Cisco Pix Firewall Software 5.3\\(3\\)
Cisco Pix Firewall Software 6.2\\(1\\)
Cisco Pix Firewall Software 6.2\\(2\\)
Cisco Pix Firewall Software 6.2\\(3\\)
Cisco Pix Firewall Software 6.2\\(3.100\\)
Cisco Pix Firewall Software 5.2\\(1\\)
Cisco Pix Firewall Software 5.2\\(2\\)
668
VMScore
CVE-2000-0150
Check Point Firewall-1 allows remote malicious users to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt.
Checkpoint Firewall-1 3.0
Cisco Pix Firewall Software 4.1\\(6\\)
Cisco Pix Firewall Software 4.2\\(1\\)
Cisco Pix Firewall Software 4.2\\(2\\)
Cisco Pix Firewall Software 4.3
Cisco Pix Firewall Software 4.4\\(4\\)
Checkpoint Firewall-1 4.0
Cisco Pix Firewall Software 4.1\\(6b\\)
Cisco Pix Firewall Software 5.0
505
VMScore
CVE-2001-0375
Cisco PIX Firewall 515 and 520 with 5.1.4 OS running aaa authentication to a TACACS+ server allows remote malicious users to cause a denial of service via a large number of authentication requests.
Cisco Pix Firewall 515
Cisco Pix Firewall 520
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »