cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2014-0710,https://securityvulnerability.io/vulnerability/CVE-2014-0710,,"Race condition in the cut-through proxy feature in Cisco Firewall Services Module (FWSM) Software 3.x before 3.2(28) and 4.x before 4.1(15) allows remote attackers to cause a denial of service (device reload) via certain matching traffic, aka Bug ID CSCuj16824.",Cisco,Firewall Services Module Software,,,0.001610000035725534,false,,false,false,false,,,false,false,,2014-02-22T21:00:00.000Z,0 CVE-2013-5506,https://securityvulnerability.io/vulnerability/CVE-2013-5506,,"The authorization functionality in Cisco Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(25) and 4.x before 4.1(13), when multiple-context mode is enabled, allows local users to read or modify any context's configuration via unspecified commands, aka Bug ID CSCue46080.",Cisco,Firewall Services Module Software,,,0.00171999994199723,false,,false,false,false,,,false,false,,2013-10-13T10:20:00.000Z,0 CVE-2013-1195,https://securityvulnerability.io/vulnerability/CVE-2013-1195,,"The time-based ACL implementation on Cisco Adaptive Security Appliances (ASA) devices, and in Cisco Firewall Services Module (FWSM), does not properly handle periodic statements for the time-range command, which allows remote attackers to bypass intended access restrictions by sending network traffic during denied time periods, aka Bug IDs CSCuf79091 and CSCug45850.",Cisco,"Firewall Services Module,Adaptive Security Appliance Software",,,0.002090000081807375,false,,false,false,false,,,false,false,,2013-04-24T10:28:00.000Z,0 CVE-2013-1193,https://securityvulnerability.io/vulnerability/CVE-2013-1193,,"The Secure Shell (SSH) implementation on Cisco Adaptive Security Appliances (ASA) devices, and in Cisco Firewall Services Module (FWSM), does not properly terminate sessions, which allows remote attackers to cause a denial of service (SSH service outage) by repeatedly establishing SSH connections, aka Bug IDs CSCue63881, CSCuf51892, CSCue78671, and CSCug26937.",Cisco,"Firewall Services Module,Adaptive Security Appliance Software",,,0.001610000035725534,false,,false,false,false,,,false,false,,2013-04-16T14:04:00.000Z,0 CVE-2013-1155,https://securityvulnerability.io/vulnerability/CVE-2013-1155,,"The auth-proxy functionality in Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(20.1), 4.0 before 4.0(15.2), and 4.1 before 4.1(5.1) allows remote attackers to cause a denial of service (device reload) via a crafted URL, aka Bug ID CSCtg02624.",Cisco,Firewall Services Module Software,,,0.001610000035725534,false,,false,false,false,,,false,false,,2013-04-11T10:55:00.000Z,0 CVE-2012-0356,https://securityvulnerability.io/vulnerability/CVE-2012-0356,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 7.0 through 7.2 before 7.2(5.7), 8.0 before 8.0(5.27), 8.1 before 8.1(2.53), 8.2 before 8.2(5.8), 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.2) and the Firewall Services Module (FWSM) 3.1 and 3.2 before 3.2(23) and 4.0 and 4.1 before 4.1(8) in Cisco Catalyst 6500 series devices, when multicast routing is enabled, allow remote attackers to cause a denial of service (device reload) via a crafted IPv4 PIM message, aka Bug IDs CSCtr47517 and CSCtu97367.",Cisco,"Firewall Services Module Software,Adaptive Security Appliance Software,5500 Series Adaptive Security Appliance,Catalyst 6500,Catalyst 6503-e,Catalyst 6504-e,Catalyst 6506-e,Catalyst 6509-e,Catalyst 6509-neb-a,Catalyst 6509-v-e,Catalyst 6513,Catalyst 6513-e,Firewall Services Module",,,0.026660000905394554,false,,false,false,false,,,false,false,,2012-03-15T00:00:00.000Z,0 CVE-2011-3296,https://securityvulnerability.io/vulnerability/CVE-2011-3296,,"Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875.",Cisco,"Firewall Services Module Software,Catalyst 6500,Catalyst 7600",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2011-10-06T10:00:00.000Z,0 CVE-2011-3297,https://securityvulnerability.io/vulnerability/CVE-2011-3297,,"Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697.",Cisco,"Firewall Services Module Software,Catalyst 6500,Catalyst 7600",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2011-10-06T10:00:00.000Z,0 CVE-2010-2820,https://securityvulnerability.io/vulnerability/CVE-2010-2820,,"Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61662.",Cisco,"Firewall Services Module Software,Firewall Services Module",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2010-08-09T11:58:00.000Z,0 CVE-2010-2821,https://securityvulnerability.io/vulnerability/CVE-2010-2821,,"Unspecified vulnerability on the Cisco Firewall Services Module (FWSM) with software 3.2 before 3.2(17.2), 4.0 before 4.0(11.1), and 4.1 before 4.1(1.2) for Catalyst 6500 series switches and 7600 series routers, when multi-mode is enabled, allows remote attackers to cause a denial of service (device reload) via crafted (1) Telnet, (2) SSH, or (3) ASDM traffic over TCP, aka Bug ID CSCtg68694.",Cisco,"Firewall Services Module Software,Firewall Services Module",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2010-08-09T11:58:00.000Z,0 CVE-2010-2819,https://securityvulnerability.io/vulnerability/CVE-2010-2819,,"Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61622.",Cisco,"Firewall Services Module Software,Firewall Services Module",,,0.002589999930933118,false,,false,false,false,,,false,false,,2010-08-09T11:58:00.000Z,0 CVE-2010-2818,https://securityvulnerability.io/vulnerability/CVE-2010-2818,,"Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61710.",Cisco,"Firewall Services Module Software,Firewall Services Module",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2010-08-09T11:58:00.000Z,0 CVE-2006-0515,https://securityvulnerability.io/vulnerability/CVE-2006-0515,,"Cisco PIX/ASA 7.1.x before 7.1(2) and 7.0.x before 7.0(5), PIX 6.3.x before 6.3.5(112), and FWSM 2.3.x before 2.3(4) and 3.x before 3.1(7), when used with Websense/N2H2, allows remote attackers to bypass HTTP access restrictions by splitting the GET method of an HTTP request into multiple packets, which prevents the request from being sent to Websense for inspection, aka bugs CSCsc67612, CSCsc68472, and CSCsd81734.",Cisco,"Adaptive Security Appliance Software,Pix Firewall,Firewall Services Module,Pix Firewall Software",,,0.013580000028014183,false,,false,false,false,,,false,false,,2006-05-09T10:00:00.000Z,0 CVE-2005-3669,https://securityvulnerability.io/vulnerability/CVE-2005-3669,,"Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in multiple Cisco products allow remote attackers to cause a denial of service (device reset) via certain malformed IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the Cisco advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.",Cisco,"Firewall Services Module,Vpn 3000 Concentrator Series Software",,,0.07028000056743622,false,,false,false,false,,,false,false,,2005-11-18T21:00:00.000Z,0