cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2011-0395,https://securityvulnerability.io/vulnerability/CVE-2011-0395,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583.",Cisco,"Adaptive Security Appliance,Adaptive Security Appliance Software,Asa 5500,Asa 5505,Asa 5510,Asa 5520,Asa 5540,Asa 5550,Asa 5580,Pix 500,Pix 501,Pix 506e,Pix Firewall 506,Pix Firewall 515,Pix Firewall 520,Pix Firewall 525,Pix Firewall 535",,,0.01355000026524067,false,,false,false,false,,,false,false,,2011-02-25T11:00:00.000Z,0 CVE-2011-0396,https://securityvulnerability.io/vulnerability/CVE-2011-0396,,"Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352.",Cisco,"Adaptive Security Appliance,Adaptive Security Appliance Software,Asa 5500,Asa 5505,Asa 5510,Asa 5520,Asa 5540,Asa 5550,Asa 5580,Pix 500,Pix 501,Pix 506e,Pix Firewall 506,Pix Firewall 515,Pix Firewall 520,Pix Firewall 525,Pix Firewall 535",,,0.004600000102072954,false,,false,false,false,,,false,false,,2011-02-25T11:00:00.000Z,0 CVE-2010-2815,https://securityvulnerability.io/vulnerability/CVE-2010-2815,,"Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf55259.",Cisco,"Adaptive Security Appliance,Adaptive Security Appliance Software,Asa 5500,Asa 5505,Asa 5510,Asa 5520,Asa 5540,Asa 5550,Asa 5580,Pix 500,Pix 501,Pix 506e,Pix Firewall 506,Pix Firewall 515,Pix Firewall 520,Pix Firewall 525,Pix Firewall 535",,,0.005630000028759241,false,,false,false,false,,,false,false,,2010-08-09T11:58:00.000Z,0 CVE-2010-2814,https://securityvulnerability.io/vulnerability/CVE-2010-2814,,"Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf37506.",Cisco,"Adaptive Security Appliance,Adaptive Security Appliance Software,Asa 5500,Asa 5505,Asa 5510,Asa 5520,Asa 5540,Asa 5550,Asa 5580,Pix 500,Pix 501,Pix 506e,Pix Firewall 506,Pix Firewall 515,Pix Firewall 520,Pix Firewall 525,Pix Firewall 535",,,0.005630000028759241,false,,false,false,false,,,false,false,,2010-08-09T11:58:00.000Z,0 CVE-2010-2817,https://securityvulnerability.io/vulnerability/CVE-2010-2817,,"Unspecified vulnerability in the IKE implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.10), and 8.3 before 8.3(1.1) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a crafted IKE message, aka Bug ID CSCte46507.",Cisco,"Adaptive Security Appliance,Adaptive Security Appliance Software,Asa 5500,Asa 5505,Asa 5510,Asa 5520,Asa 5540,Asa 5550,Asa 5580,Pix 500,Pix 501,Pix 506e,Pix Firewall 506,Pix Firewall 515,Pix Firewall 520,Pix Firewall 525,Pix Firewall 535",,,0.005630000028759241,false,,false,false,false,,,false,false,,2010-08-09T11:58:00.000Z,0 CVE-2010-2816,https://securityvulnerability.io/vulnerability/CVE-2010-2816,,"Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.17), 8.1 before 8.1(2.45), and 8.2 before 8.2(2.13) allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtd32106.",Cisco,"Adaptive Security Appliance,Adaptive Security Appliance Software,Asa 5500,Asa 5505,Asa 5510,Asa 5520,Asa 5540,Asa 5550,Asa 5580,Pix 500,Pix 501,Pix 506e,Pix Firewall 506,Pix Firewall 515,Pix Firewall 520,Pix Firewall 525,Pix Firewall 535",,,0.005630000028759241,false,,false,false,false,,,false,false,,2010-08-09T11:58:00.000Z,0 CVE-2008-0028,https://securityvulnerability.io/vulnerability/CVE-2008-0028,,"Unspecified vulnerability in Cisco PIX 500 Series Security Appliance and 5500 Series Adaptive Security Appliance (ASA) before 7.2(3)6 and 8.0(3), when the Time-to-Live (TTL) decrement feature is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted IP packet.",Cisco,"Adaptive Security Appliance Software,Pix Firewall Software",,,0.014189999550580978,false,,false,false,false,,,false,false,,2008-01-23T20:00:00.000Z,0 CVE-2007-0959,https://securityvulnerability.io/vulnerability/CVE-2007-0959,,"Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets.",Cisco,"Asa 5500,Pix Firewall Software",,,0.032669998705387115,false,,false,false,false,,,false,false,,2007-02-16T00:00:00.000Z,0 CVE-2007-0961,https://securityvulnerability.io/vulnerability/CVE-2007-0961,,"Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the ""inspect sip"" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets.",Cisco,"Pix Firewall Software,Asa 5500",,,0.1842699944972992,false,,false,false,false,,,false,false,,2007-02-16T00:00:00.000Z,0 CVE-2007-0960,https://securityvulnerability.io/vulnerability/CVE-2007-0960,,"Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors.",Cisco,"Asa 5500,Pix Firewall Software",,,0.0042500002309679985,false,,false,false,false,,,false,false,,2007-02-16T00:00:00.000Z,0 CVE-2006-4312,https://securityvulnerability.io/vulnerability/CVE-2006-4312,,"Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a ""non-random value"" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access.",Cisco,"Pix Firewall 501,Pix Firewall 515,Pix Firewall 525,Pix Firewall 520,Pix Firewall 515e,Pix Firewall 535,Pix Firewall 506,Pix Firewall Software",,,0.0006000000284984708,false,,false,false,false,,,false,false,,2006-08-23T22:00:00.000Z,0 CVE-2006-4194,https://securityvulnerability.io/vulnerability/CVE-2006-4194,,"Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attackers to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032. NOTE: the vendor, after working with the researcher, has been unable to reproduce the issue",Cisco,"Pix Firewall 501,Pix Firewall 515,Pix Firewall 525,Pix Firewall 520,Pix Firewall 515e,Pix Firewall 535,Pix Firewall 506,Pix Firewall Software",,,0.025499999523162842,false,,false,false,false,,,false,false,,2006-08-17T01:00:00.000Z,0 CVE-2006-3906,https://securityvulnerability.io/vulnerability/CVE-2006-3906,,"Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected.",Cisco,"Ios,Vpn 3001 Concentrator,Vpn 3015 Concentrator,Vpn 3020 Concentrator,Vpn 3030 Concentator,Vpn 3060 Concentrator,Vpn 3080 Concentrator,Adaptive Security Appliance Software,Vpn 3000 Concentrator Series Software,Vpn 3005 Concentrator Software,Pix Asa Ids,Pix Firewall,Pix Firewall 501,Pix Firewall 506,Pix Firewall 515,Pix Firewall 515e,Pix Firewall 520,Pix Firewall 525,Pix Firewall 535,Secure Pix Firewall,Pix Firewall Software",,,0.05920000001788139,false,,false,false,false,,,false,false,,2006-07-27T22:00:00.000Z,0 CVE-2006-0515,https://securityvulnerability.io/vulnerability/CVE-2006-0515,,"Cisco PIX/ASA 7.1.x before 7.1(2) and 7.0.x before 7.0(5), PIX 6.3.x before 6.3.5(112), and FWSM 2.3.x before 2.3(4) and 3.x before 3.1(7), when used with Websense/N2H2, allows remote attackers to bypass HTTP access restrictions by splitting the GET method of an HTTP request into multiple packets, which prevents the request from being sent to Websense for inspection, aka bugs CSCsc67612, CSCsc68472, and CSCsd81734.",Cisco,"Adaptive Security Appliance Software,Pix Firewall,Firewall Services Module,Pix Firewall Software",,,0.013580000028014183,false,,false,false,false,,,false,false,,2006-05-09T10:00:00.000Z,0 CVE-2005-4499,https://securityvulnerability.io/vulnerability/CVE-2005-4499,,"The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.",Cisco,"Vpn 3001 Concentrator,Vpn 3015 Concentrator,Vpn 3020 Concentrator,Vpn 3030 Concentator,Vpn 3060 Concentrator,Vpn 3080 Concentrator,Adaptive Security Appliance Software,Vpn 3000 Concentrator Series Software,Vpn 3005 Concentrator Software,Pix Asa Ids,Pix Firewall,Secure Access Control Server,Vpn 3002 Hardware Client,Pix Firewall 501,Pix Firewall 506,Pix Firewall 515,Pix Firewall 515e,Pix Firewall 520,Pix Firewall 525,Pix Firewall 535,Pix Firewall Software",,,0.009530000388622284,false,,false,false,false,,,false,false,,2005-12-22T11:00:00.000Z,0 CVE-2003-1003,https://securityvulnerability.io/vulnerability/CVE-2003-1003,,"Cisco PIX firewall 5.x.x, and 6.3.1 and earlier, allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.",Cisco,"Pix Firewall,Pix Firewall Software",,,0.002319999970495701,false,,false,false,false,,,false,false,,2004-01-05T05:00:00.000Z,0 CVE-2003-1004,https://securityvulnerability.io/vulnerability/CVE-2003-1004,,"Cisco PIX firewall 6.2.x through 6.2.3, when configured as a VPN Client, allows remote attackers to cause a denial of service (dropped IPSec tunnel connection) via an IKE Phase I negotiation request to the outside interface of the firewall.",Cisco,"Pix Firewall,Pix Firewall Software",,,0.0016199999954551458,false,,false,false,false,,,false,false,,2004-01-05T05:00:00.000Z,0 CVE-2003-1109,https://securityvulnerability.io/vulnerability/CVE-2003-1109,,"The Session Initiation Protocol (SIP) implementation in multiple Cisco products including IP Phone models 7940 and 7960, IOS versions in the 12.2 train, and Secure PIX 5.2.9 to 6.2.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.",Cisco,"Ios,Ip Phone 7940,Ip Phone 7960,Pix Firewall Software",,,0.04360999912023544,false,,false,false,false,,,false,false,,2003-12-31T05:00:00.000Z,0 CVE-2003-0851,https://securityvulnerability.io/vulnerability/CVE-2003-0851,,OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recursion) via malformed ASN.1 sequences.,Cisco,"Ios,Css11000 Content Services Switch,Pix Firewall,OpenSSL,Pix Firewall Software",,,0.05079000070691109,false,,false,false,false,,,false,false,,2003-12-01T05:00:00.000Z,0 CVE-2002-2139,https://securityvulnerability.io/vulnerability/CVE-2002-2139,,"Cisco PIX Firewall 6.0.3 and earlier, and 6.1.x to 6.1.3, do not delete the duplicate ISAKMP SAs for a user's VPN session, which allows local users to hijack a session via a man-in-the-middle attack.",Cisco,Pix Firewall Software,,,0.0010499999625608325,false,,false,false,false,,,false,false,,2002-12-31T05:00:00.000Z,0 CVE-2002-2140,https://securityvulnerability.io/vulnerability/CVE-2002-2140,,"Buffer overflow in Cisco PIX Firewall 5.2.x to 5.2.8, 6.0.x to 6.0.3, 6.1.x to 6.1.3, and 6.2.x to 6.2.1 allows remote attackers to cause a denial of service via HTTP traffic authentication using (1) TACACS+ or (2) RADIUS.",Cisco,Pix Firewall Software,,,0.006839999929070473,false,,false,false,false,,,false,false,,2002-12-31T05:00:00.000Z,0 CVE-2002-0954,https://securityvulnerability.io/vulnerability/CVE-2002-0954,,"The encryption algorithms for enable and passwd commands on Cisco PIX Firewall can be executed quickly due to a limited number of rounds, which make it easier for an attacker to decrypt the passwords using brute force techniques.",Cisco,Pix Firewall,,,0.05327000096440315,false,,false,false,false,,,false,false,,2002-10-04T04:00:00.000Z,0 CVE-2002-1024,https://securityvulnerability.io/vulnerability/CVE-2002-1024,,"Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144).",Cisco,"Ios,Pix Firewall Software,Css11000 Content Services Switch",,,0.007579999975860119,false,,false,false,false,,,false,false,,2002-10-04T04:00:00.000Z,0 CVE-2001-1098,https://securityvulnerability.io/vulnerability/CVE-2001-1098,,"Cisco PIX firewall manager (PFM) 4.3(2)g logs the enable password in plaintext in the pfm.log file, which could allow local users to obtain the password by reading the file.",Cisco,Pix Firewall Manager,,,0.0004199999966658652,false,,false,false,false,,,false,false,,2001-10-10T04:00:00.000Z,0 CVE-2001-0375,https://securityvulnerability.io/vulnerability/CVE-2001-0375,,Cisco PIX Firewall 515 and 520 with 5.1.4 OS running aaa authentication to a TACACS+ server allows remote attackers to cause a denial of service via a large number of authentication requests.,Cisco,"Pix Firewall 515,Pix Firewall 520",,,0.013240000233054161,false,,false,false,false,,,false,false,,2001-06-18T04:00:00.000Z,0