Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Adaptive_security_appliance_software
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 310 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2011-01-07 | CVE-2010-4682 | Memory leak on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) allows remote attackers to cause a denial of service (memory consumption) by making multiple incorrect LDAP authentication attempts, aka Bug ID CSCtf29867. | 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500 | N/A | ||
2011-01-07 | CVE-2010-4689 | Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) do not properly preserve ACL behavior after a migration, which allows remote attackers to bypass intended access restrictions via an unspecified type of network traffic that had previously been denied, aka Bug ID CSCte46460. | 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500 | N/A | ||
2011-01-07 | CVE-2010-4690 | The Mobile User Security (MUS) service on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) does not properly authenticate HTTP requests from a Web Security appliance (WSA), which might allow remote attackers to obtain sensitive information via a HEAD request, aka Bug ID CSCte53635. | 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500 | N/A | ||
2011-02-25 | CVE-2011-0393 | Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.12), 7.1 and 7.2 before 7.2(5.2), 8.0 before 8.0(5.21), 8.1 before 8.1(2.49), 8.2 before 8.2(3.6), and 8.3 before 8.3(2.7) and Cisco PIX Security Appliances 500 series devices, when transparent firewall mode is configured but IPv6 is not configured, allow remote attackers to cause a denial of service (packet buffer exhaustion and device outage) via IPv6 traffic, aka Bug ID CSCtj04707. | 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Pix_500 | N/A | ||
2011-01-07 | CVE-2010-4692 | Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) allows remote attackers to cause a denial of service (device crash) via a large number of LAN-to-LAN (aka L2L) IPsec sessions, aka Bug ID CSCth36592. | 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500 | N/A | ||
2011-02-25 | CVE-2011-0394 | Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client... | 5500_series_adaptive_security_appliance, Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Firewall_services_module, Firewall_services_module_software, Pix_500 | N/A | ||
2011-02-25 | CVE-2011-0395 | Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583. | Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Asa_5505, Asa_5510, Asa_5520, Asa_5540, Asa_5550, Asa_5580, Pix_500, Pix_501, Pix_506e, Pix_firewall_506, Pix_firewall_515, Pix_firewall_520, Pix_firewall_525, Pix_firewall_535 | N/A | ||
2011-02-25 | CVE-2011-0396 | Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352. | Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Asa_5505, Asa_5510, Asa_5520, Asa_5540, Asa_5550, Asa_5580, Pix_500, Pix_501, Pix_506e, Pix_firewall_506, Pix_firewall_515, Pix_firewall_520, Pix_firewall_525, Pix_firewall_535 | N/A | ||
2012-10-29 | CVE-2012-4659 | The AAA functionality in the IPv4 SSL VPN implementations on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.2 before 8.2(5.30) and 8.3 before 8.3(2.34) allows remote attackers to cause a denial of service (device reload) via a crafted authentication response, aka Bug ID CSCtz04566. | 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Catalyst_6500, Catalyst_6503\-E, Catalyst_6504\-E, Catalyst_6506\-E, Catalyst_6509\-E, Catalyst_6509\-Neb\-A, Catalyst_6509\-V\-E, Catalyst_6513, Catalyst_6513\-E | N/A | ||
2013-04-16 | CVE-2013-1193 | The Secure Shell (SSH) implementation on Cisco Adaptive Security Appliances (ASA) devices, and in Cisco Firewall Services Module (FWSM), does not properly terminate sessions, which allows remote attackers to cause a denial of service (SSH service outage) by repeatedly establishing SSH connections, aka Bug IDs CSCue63881, CSCuf51892, CSCue78671, and CSCug26937. | Adaptive_security_appliance_software, Firewall_services_module | N/A |