cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2013-1215,https://securityvulnerability.io/vulnerability/CVE-2013-1215,,"The vpnclient program in the Easy VPN component on Cisco Adaptive Security Appliances (ASA) 5505 devices allows local users to gain privileges via unspecified vectors, aka Bug ID CSCuf85295.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Asa 5500",,,0.00171999994199723,false,,false,false,false,,,false,false,,2013-04-25T20:55:00.000Z,0 CVE-2012-5415,https://securityvulnerability.io/vulnerability/CVE-2012-5415,,"Race condition on Cisco Adaptive Security Appliances (ASA) devices allows remote attackers to cause a denial of service (CPU consumption or device reload) by establishing multiple connections, leading to improper handling of hash lookups for secondary flows, aka Bug IDs CSCue31622 and CSCuc71272.",Cisco,"5500 Series Adaptive Security Appliance,Adaptive Security Appliance,5500 Adaptive Security Appliance",,,0.001610000035725534,false,,false,false,false,,,false,false,,2013-04-16T14:04:00.000Z,0 CVE-2013-1149,https://securityvulnerability.io/vulnerability/CVE-2013-1149,,"Cisco Adaptive Security Appliances (ASA) devices with software 7.x before 7.2(5.10), 8.0 before 8.0(5.28), 8.1 and 8.2 before 8.2(5.35), 8.3 before 8.3(2.34), 8.4 before 8.4(4.11), 8.6 before 8.6(1.10), and 8.7 before 8.7(1.3), and Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(24.1) and 4.0 and 4.1 before 4.1(11.1), allow remote attackers to cause a denial of service (device reload) via a crafted IKEv1 message, aka Bug IDs CSCub85692 and CSCud20267.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,6500 Series Adaptive Security Appliance,7600 Series Adaptive Security Appliance",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2013-04-11T10:55:00.000Z,0 CVE-2012-6395,https://securityvulnerability.io/vulnerability/CVE-2012-6395,,"Cisco Adaptive Security Appliances (ASA) devices with firmware 8.4 do not properly validate unspecified input related to UNC share pathnames, which allows remote authenticated users to cause a denial of service (device crash) via unknown vectors, aka Bug ID CSCuc65775.",Cisco,"Adaptive Security Appliance Software,Adaptive Security Appliance,Asa 1000v Cloud Firewall,Asa 5500",,,0.0021800000686198473,false,,false,false,false,,,false,false,,2013-01-18T21:00:00.000Z,0 CVE-2012-5717,https://securityvulnerability.io/vulnerability/CVE-2012-5717,,"Cisco Adaptive Security Appliances (ASA) devices with firmware 8.x through 8.4(1) do not properly manage SSH sessions, which allows remote authenticated users to cause a denial of service (device crash) by establishing multiple sessions, aka Bug ID CSCtc59462.",Cisco,"Adaptive Security Appliance Software,Adaptive Security Appliance,Asa 1000v Cloud Firewall,Asa 5500",,,0.0010000000474974513,false,,false,false,false,,,false,false,,2013-01-18T21:00:00.000Z,0 CVE-2012-4659,https://securityvulnerability.io/vulnerability/CVE-2012-4659,,"The AAA functionality in the IPv4 SSL VPN implementations on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.2 before 8.2(5.30) and 8.3 before 8.3(2.34) allows remote attackers to cause a denial of service (device reload) via a crafted authentication response, aka Bug ID CSCtz04566.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.005630000028759241,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2012-4660,https://securityvulnerability.io/vulnerability/CVE-2012-4660,,"The SIP inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.2 before 8.2(5.17), 8.3 before 8.3(2.28), 8.4 before 8.4(2.13), 8.5 before 8.5(1.4), and 8.6 before 8.6(1.5) allows remote attackers to cause a denial of service (device reload) via a crafted SIP media-update packet, aka Bug ID CSCtr63728.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.005200000014156103,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2012-4643,https://securityvulnerability.io/vulnerability/CVE-2012-4643,,"The DHCP server on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 7.0 before 7.2(5.8), 7.1 before 7.2(5.8), 7.2 before 7.2(5.8), 8.0 before 8.0(5.28), 8.1 before 8.1(2.56), 8.2 before 8.2(5.27), 8.3 before 8.3(2.31), 8.4 before 8.4(3.10), 8.5 before 8.5(1.9), and 8.6 before 8.6(1.5) does not properly allocate memory for DHCP packets, which allows remote attackers to cause a denial of service (device reload) via a series of crafted IPv4 packets, aka Bug ID CSCtw84068.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.005630000028759241,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2012-4662,https://securityvulnerability.io/vulnerability/CVE-2012-4662,,"The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.13) and the Firewall Services Module (FWSM) 4.1 before 4.1(7) in Cisco Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via a crafted DCERPC packet, aka Bug IDs CSCtr21376 and CSCtr27524.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,7600 Router,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.01923000067472458,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2012-4661,https://securityvulnerability.io/vulnerability/CVE-2012-4661,,"Stack-based buffer overflow in the DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.34), 8.4 before 8.4(4.4), 8.5 before 8.5(1.13), and 8.6 before 8.6(1.3) and the Firewall Services Module (FWSM) 4.1 before 4.1(9) in Cisco Catalyst 6500 series switches and 7600 series routers might allow remote attackers to execute arbitrary code via a crafted DCERPC packet, aka Bug IDs CSCtr21359 and CSCtr27522.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,7600 Router,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.08340000361204147,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2012-4663,https://securityvulnerability.io/vulnerability/CVE-2012-4663,,"The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.13) and the Firewall Services Module (FWSM) 4.1 before 4.1(7) in Cisco Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via a crafted DCERPC packet, aka Bug IDs CSCtr21346 and CSCtr27521.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,7600 Router,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.01923000067472458,false,,false,false,false,,,false,false,,2012-10-29T20:00:00.000Z,0 CVE-2012-2472,https://securityvulnerability.io/vulnerability/CVE-2012-2472,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 and 8.4, when SIP inspection is enabled, create many identical pre-allocated secondary pinholes, which might allow remote attackers to cause a denial of service (CPU consumption) via crafted SIP traffic, aka Bug ID CSCtz63143.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance",,,0.001610000035725534,false,,false,false,false,,,false,false,,2012-08-06T17:55:00.000Z,0 CVE-2012-2474,https://securityvulnerability.io/vulnerability/CVE-2012-2474,,"Memory leak on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 through 8.4 allows remote authenticated users to cause a denial of service (memory consumption and blank response page) by using the clientless WebVPN feature, aka Bug ID CSCth34278.",Cisco,"5500 Series Adaptive Security Appliance,Adaptive Security Appliance Software",,,0.00107999995816499,false,,false,false,false,,,false,false,,2012-08-06T17:55:00.000Z,0 CVE-2012-3058,https://securityvulnerability.io/vulnerability/CVE-2012-3058,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.4 before 8.4(4.1), 8.5 before 8.5(1.11), and 8.6 before 8.6(1.3) allow remote attackers to cause a denial of service (device reload) via IPv6 transit traffic that triggers syslog message 110003, aka Bug ID CSCua27134.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2012-06-20T20:00:00.000Z,0 CVE-2012-0378,https://securityvulnerability.io/vulnerability/CVE-2012-0378,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 through 8.4 allow remote attackers to cause a denial of service (connection limit exceeded) by triggering a large number of stale connections that result in an incorrect value for an MPF connection count, aka Bug ID CSCtv19854.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2012-05-03T20:55:00.000Z,0 CVE-2011-3285,https://securityvulnerability.io/vulnerability/CVE-2011-3285,,"CRLF injection vulnerability in /+CSCOE+/logon.html on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 through 8.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors, aka Bug ID CSCth63101.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance",,,0.002570000011473894,false,,false,false,false,,,false,false,,2012-05-02T10:00:00.000Z,0 CVE-2011-3309,https://securityvulnerability.io/vulnerability/CVE-2011-3309,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 through 8.4 process IKE requests despite a vpnclient mode configuration, which allows remote attackers to obtain potentially sensitive information by reading IKE responder traffic, aka Bug ID CSCtt07749.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance",,,0.002689999993890524,false,,false,false,false,,,false,false,,2012-05-02T10:00:00.000Z,0 CVE-2012-0335,https://securityvulnerability.io/vulnerability/CVE-2012-0335,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 through 8.4 do not properly perform proxy authentication during attempts to cut through a firewall, which allows remote attackers to obtain sensitive information via a connection attempt, aka Bug ID CSCtx42746.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance",,,0.0033499998971819878,false,,false,false,false,,,false,false,,2012-05-02T10:00:00.000Z,0 CVE-2011-4006,https://securityvulnerability.io/vulnerability/CVE-2011-4006,,"The ESMTP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 through 8.5 allows remote attackers to cause a denial of service (CPU consumption) via an unspecified closing sequence, aka Bug ID CSCtt32565.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance",,,0.00203999993391335,false,,false,false,false,,,false,false,,2012-05-02T10:00:00.000Z,0 CVE-2012-0354,https://securityvulnerability.io/vulnerability/CVE-2012-0354,,"The Threat Detection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.0 through 8.2 before 8.2(5.20), 8.3 before 8.3(2.29), 8.4 before 8.4(3), 8.5 before 8.5(1.6), and 8.6 before 8.6(1.1) allows remote attackers to cause a denial of service (device reload) via (1) IPv4 or (2) IPv6 packets that trigger a shun event, aka Bug ID CSCtw35765.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.022089999169111252,false,,false,false,false,,,false,false,,2012-03-15T00:00:00.000Z,0 CVE-2012-0358,https://securityvulnerability.io/vulnerability/CVE-2012-0358,,"Buffer overflow in the Cisco Port Forwarder ActiveX control in cscopf.ocx, as distributed through the Clientless VPN feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 through 7.2 before 7.2(5.6), 8.0 before 8.0(5.26), 8.1 before 8.1(2.53), 8.2 before 8.2(5.18), 8.3 before 8.3(2.28), 8.2 before 8.4(2.16), and 8.6 before 8.6(1.1), allows remote attackers to execute arbitrary code via unspecified vectors, aka Bug ID CSCtr00165.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance",,,0.024170000106096268,false,,false,false,false,,,false,false,,2012-03-15T00:00:00.000Z,0 CVE-2012-0353,https://securityvulnerability.io/vulnerability/CVE-2012-0353,,"The UDP inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.5), 8.3 before 8.3(2.22), 8.4 before 8.4(2.1), and 8.5 before 8.5(1.2) does not properly handle flows, which allows remote attackers to cause a denial of service (device reload) via a crafted series of (1) IPv4 or (2) IPv6 UDP packets, aka Bug ID CSCtq10441.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.022089999169111252,false,,false,false,false,,,false,false,,2012-03-15T00:00:00.000Z,0 CVE-2012-0356,https://securityvulnerability.io/vulnerability/CVE-2012-0356,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 7.0 through 7.2 before 7.2(5.7), 8.0 before 8.0(5.27), 8.1 before 8.1(2.53), 8.2 before 8.2(5.8), 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.2) and the Firewall Services Module (FWSM) 3.1 and 3.2 before 3.2(23) and 4.0 and 4.1 before 4.1(8) in Cisco Catalyst 6500 series devices, when multicast routing is enabled, allow remote attackers to cause a denial of service (device reload) via a crafted IPv4 PIM message, aka Bug IDs CSCtr47517 and CSCtu97367.",Cisco,"Firewall Services Module Software,Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e,Firewall Services Module",,,0.026660000905394554,false,,false,false,false,,,false,false,,2012-03-15T00:00:00.000Z,0 CVE-2012-0355,https://securityvulnerability.io/vulnerability/CVE-2012-0355,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.4 before 8.4(2.11) and 8.5 before 8.5(1.4) allow remote attackers to cause a denial of service (device reload) via (1) IPv4 or (2) IPv6 packets that trigger syslog message 305006, aka Bug ID CSCts39634.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e",,,0.01355000026524067,false,,false,false,false,,,false,false,,2012-03-15T00:00:00.000Z,0 CVE-2011-2060,https://securityvulnerability.io/vulnerability/CVE-2011-2060,,"The platform-sw component on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 before 8.2(5.3), 8.3 before 8.3(2.20), and 8.4 before 8.4(2.1) does not properly handle non-ASCII characters in an interface description, which allows local users to cause a denial of service (reload without configuration) via a crafted description, aka Bug ID CSCtq50523.",Cisco,"Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance",,,0.0004799999878741801,false,,false,false,false,,,false,false,,2011-10-22T02:59:00.000Z,0