Note:
This project will be discontinued after December 13, 2021. [more]
Product:
5500_series_adaptive_security_appliance
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 51 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2011-01-07 | CVE-2010-4682 | Memory leak on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) allows remote attackers to cause a denial of service (memory consumption) by making multiple incorrect LDAP authentication attempts, aka Bug ID CSCtf29867. | 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500 | N/A | ||
2011-01-07 | CVE-2010-4689 | Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) do not properly preserve ACL behavior after a migration, which allows remote attackers to bypass intended access restrictions via an unspecified type of network traffic that had previously been denied, aka Bug ID CSCte46460. | 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500 | N/A | ||
2011-01-07 | CVE-2010-4690 | The Mobile User Security (MUS) service on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) does not properly authenticate HTTP requests from a Web Security appliance (WSA), which might allow remote attackers to obtain sensitive information via a HEAD request, aka Bug ID CSCte53635. | 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500 | N/A | ||
2011-02-25 | CVE-2011-0393 | Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.12), 7.1 and 7.2 before 7.2(5.2), 8.0 before 8.0(5.21), 8.1 before 8.1(2.49), 8.2 before 8.2(3.6), and 8.3 before 8.3(2.7) and Cisco PIX Security Appliances 500 series devices, when transparent firewall mode is configured but IPv6 is not configured, allow remote attackers to cause a denial of service (packet buffer exhaustion and device outage) via IPv6 traffic, aka Bug ID CSCtj04707. | 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Pix_500 | N/A | ||
2011-01-07 | CVE-2010-4692 | Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) allows remote attackers to cause a denial of service (device crash) via a large number of LAN-to-LAN (aka L2L) IPsec sessions, aka Bug ID CSCth36592. | 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500 | N/A | ||
2011-02-25 | CVE-2011-0394 | Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client... | 5500_series_adaptive_security_appliance, Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Firewall_services_module, Firewall_services_module_software, Pix_500 | N/A | ||
2012-10-29 | CVE-2012-4659 | The AAA functionality in the IPv4 SSL VPN implementations on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.2 before 8.2(5.30) and 8.3 before 8.3(2.34) allows remote attackers to cause a denial of service (device reload) via a crafted authentication response, aka Bug ID CSCtz04566. | 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Catalyst_6500, Catalyst_6503\-E, Catalyst_6504\-E, Catalyst_6506\-E, Catalyst_6509\-E, Catalyst_6509\-Neb\-A, Catalyst_6509\-V\-E, Catalyst_6513, Catalyst_6513\-E | N/A | ||
2013-04-25 | CVE-2013-1215 | The vpnclient program in the Easy VPN component on Cisco Adaptive Security Appliances (ASA) 5505 devices allows local users to gain privileges via unspecified vectors, aka Bug ID CSCuf85295. | 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500 | N/A | ||
2013-04-16 | CVE-2012-5415 | Race condition on Cisco Adaptive Security Appliances (ASA) devices allows remote attackers to cause a denial of service (CPU consumption or device reload) by establishing multiple connections, leading to improper handling of hash lookups for secondary flows, aka Bug IDs CSCue31622 and CSCuc71272. | 5500_adaptive_security_appliance, 5500_series_adaptive_security_appliance, Adaptive_security_appliance | N/A | ||
2011-02-25 | CVE-2011-0379 | Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761. | 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Telepresence_manager, Telepresence_multipoint_switch, Telepresence_multipoint_switch_software, Telepresence_system_1000, Telepresence_system_1100, Telepresence_system_1300_series, Telepresence_system_3000, Telepresence_system_3200_series, Telepresence_system_500_series, Telepresence_system_software | N/A |