This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/a:cisco:adaptive_security_appliance_software:7.2.2.6
Detail
VendorCiscoFirst view 2007-09-10
ProductAdaptive Security Appliance SoftwareLast view2019-08-07
Version7.2.2.6TypeApplication
Edition 
Language 
Update 
 
CPE Productcpe:/a:cisco:adaptive_security_appliance_software

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
 DateAlertAccess VectorAccess ComplexityAuthentication
4.62019-08-07CVE-2019-1945LocalLowNone Requ...
4.42019-08-07CVE-2019-1944LocalMediumNone Requ...
6.52019-08-07CVE-2019-1934NetworkLowRequires ...
9.32019-05-03CVE-2019-1713NetworkMediumNone Requ...
3.52019-05-03CVE-2019-1701NetworkMediumRequires ...
Hide | Show 20 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
7.82019-05-03CVE-2019-1697NetworkLowNone Requ...
6.12019-05-03CVE-2019-1695Adjacent ...LowNone Requ...
7.82019-05-03CVE-2019-1694NetworkLowNone Requ...
6.82019-05-03CVE-2019-1693NetworkLowRequires ...
7.82019-05-03CVE-2019-1687NetworkLowNone Requ...
7.82019-05-03CVE-2018-15388NetworkLowNone Requ...
5.52018-12-24CVE-2018-15465NetworkLowRequires ...
102018-01-29CVE-2018-0101NetworkLowNone Requ...
4.32017-08-07CVE-2017-6770Adjacent ...MediumNone Requ...
4.82017-06-27CVE-2012-5010Adjacent ...LowNone Requ...
82017-02-09CVE-2017-3807NetworkLowRequires ...
6.82016-08-18CVE-2016-6367LocalLowRequires ...
8.52016-08-18CVE-2016-6366NetworkMediumRequires ...
102016-02-11CVE-2016-1287NetworkLowNone Requ...
7.82015-10-24CVE-2015-6327NetworkLowNone Requ...
7.82015-10-24CVE-2015-6326NetworkLowNone Requ...
7.12015-10-24CVE-2015-6325NetworkMediumNone Requ...
42015-06-04CVE-2015-0760NetworkLowRequires ...
7.12015-04-12CVE-2015-0676NetworkMediumNone Requ...

CWE : Common Weakness Enumeration

%idName
34% (18)CWE-399Resource Management Errors
23% (12)CWE-20Improper Input Validation
11% (6)CWE-264Permissions, Privileges, and Access Controls
7% (4)CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
1% (1)CWE-415Double Free
Hide | Show 11 More...
%idName
1% (1)CWE-400Uncontrolled Resource Consumption ('Resource Exhaustion')
1% (1)CWE-352Cross-Site Request Forgery (CSRF)
1% (1)CWE-287Improper Authentication
1% (1)CWE-285Improper Access Control (Authorization)
1% (1)CWE-284Access Control (Authorization) Issues
1% (1)CWE-255Credentials Management
1% (1)CWE-254Security Features
1% (1)CWE-200Information Exposure
1% (1)CWE-94Failure to Control Generation of Code ('Code Injection')
1% (1)CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting')
1% (1)CWE-17Code

CAPEC : Common Attack Pattern Enumeration & Classification

idName
CAPEC-31Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-37Lifting Data Embedded in Client Distributions
CAPEC-65Passively Sniff and Capture Application Code Bound for Authorized Client
CAPEC-102Session Sidejacking
CAPEC-117Data Interception Attacks
Hide | Show 8 More...
idName
CAPEC-155Screen Temporary Files for Sensitive Information
CAPEC-157Sniffing Attacks
CAPEC-167Lifting Sensitive Data from the Client
CAPEC-204Lifting cached, sensitive data embedded in client distributions (thick or thin)
CAPEC-205Lifting credential(s)/key material embedded in client distributions (thick or...
CAPEC-258Passively Sniffing and Capturing Application Code Bound for an Authorized Cli...
CAPEC-259Passively Sniffing and Capturing Application Code Bound for an Authorized Cli...
CAPEC-260Passively Sniffing and Capturing Application Code Bound for an Authorized Cli...

Open Source Vulnerability Database (OSVDB)

idDescription
72584Cisco Multiple Products Transparent Firewall Mode IPv6 Traffic Handling Exhau...
72582Cisco Multiple Products Malformed Skinny Client Control Protocol (SCCP) Messa...
70364Cisco Adaptive Security Appliances (ASA) IPv6 Stack Neighbor Discovery Router...
70362Cisco Adaptive Security Appliances (ASA) EIGRP Multicast Storm Remote DoS
70361Cisco Adaptive Security Appliances (ASA) Packet Saturation Remote DoS
Hide | Show 16 More...
idDescription
70360Cisco Adaptive Security Appliances (ASA) Multicast Traffic Unspecified Remote...
70359Cisco Adaptive Security Appliances (ASA) TELNET Connection Interface Remote A...
70358Cisco Adaptive Security Appliances (ASA) IPsec Traffic Saturation Remote DoS
70357Cisco Adaptive Security Appliances (ASA) emWEB Document Name Space Character ...
70356Cisco Adaptive Security Appliances (ASA) Configuration Pre-load Network Packe...
70355Cisco Adaptive Security Appliances (ASA) OCSP Responder Connection Rejection ...
70354Cisco Adaptive Security Appliances (ASA) WebVPN CIFS Share Access Restriction...
70353Cisco Adaptive Security Appliances (ASA) Space Character SMTP Inspection Bypass
70352Cisco Adaptive Security Appliances (ASA) Incorrect LDAP Authentication Attemp...
70346Cisco Adaptive Security Appliances (ASA) SIP Inspection Feature Multiple SIP ...
70345Cisco Adaptive Security Appliances (ASA) Unspecified Network Traffic Post-mig...
70344Cisco Adaptive Security Appliances (ASA) Mobile User Security Service HTTP HE...
70343Cisco Adaptive Security Appliances (ASA) Multicast Traffic Unspecified Remote...
70342Cisco Adaptive Security Appliances (ASA) LAN-to-LAN IPsec Session Saturation ...
70338Cisco Adaptive Security Appliances (ASA) Long URL ASDM Syslog Outage Remote DoS
37499Cisco Adaptive Security Appliance (ASA) PIX Cleartext Password Remote Disclosure

Information Assurance Vulnerability Management (IAVM)

idDescription
2015-A-0072Multiple Vulnerabilities in Cisco Adaptive Security Appliance (ASA) Software
Severity : Category I - VMSKEY : V0059859

Snort® IPS/IDS

DateDescription
2018-02-03Cisco ASA alloc_ch connection string
RuleID : 45597 - Type : INDICATOR-SHELLCODE - Revision : 1
2018-02-03Cisco ASA VPN aggregateAuthDataHandler double free attempt
RuleID : 45596 - Type : SERVER-OTHER - Revision : 2
2018-02-01Cisco ASA VPN aggregateAuthDataHandler double free attempt
RuleID : 45575 - Type : SERVER-OTHER - Revision : 4
2017-02-10Cisco ASA WebVPN memory corruption attempt
RuleID : 41538 - Type : SERVER-WEBAPP - Revision : 2
2016-10-01Cisco IOS commandline overflow attempt.
RuleID : 39987 - Type : INDICATOR-COMPROMISE - Revision : 2
Hide | Show 10 More...
DateDescription
2016-10-01Cisco IOS commandline overflow attempt
RuleID : 39986 - Type : INDICATOR-COMPROMISE - Revision : 2
2016-10-01Cisco IOS commandline overflow attempt.
RuleID : 39985 - Type : INDICATOR-COMPROMISE - Revision : 2
2016-10-01Cisco IOS commandline overflow attempt.
RuleID : 39984 - Type : INDICATOR-COMPROMISE - Revision : 2
2016-10-01Cisco IOS commandline overflow attempt
RuleID : 39983 - Type : INDICATOR-COMPROMISE - Revision : 2
2016-08-17Cisco ASA SNMP OID parsing stack buffer overflow attempt
RuleID : 39885 - Type : PROTOCOL-SNMP - Revision : 4
2016-03-14Cisco ASA IKEv2 invalid fragment length heap buffer overflow attempt
RuleID : 37676 - Type : SERVER-OTHER - Revision : 2
2016-03-14Cisco IOS invalid IKE fragment length memory corruption or exhaustion attempt
RuleID : 37675 - Type : SERVER-OTHER - Revision : 3
2016-03-15Cisco ASA IKEv1 invalid fragment length heap buffer overflow attempt
RuleID : 37674 - Type : SERVER-OTHER - Revision : 2
2016-03-14Cisco ASA IKEv2 invalid fragment length heap buffer overflow attempt
RuleID : 36903 - Type : SERVER-OTHER - Revision : 3
2015-04-10Cisco ASA memory exhaustion denial of service attempt
RuleID : 34051 - Type : PROTOCOL-DNS - Revision : 1

Nessus® Vulnerability Scanner

idDescription
2018-12-21Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20181219-asa-privesc.nasl - Type : ACT_GATHER_INFO
2018-02-26Name : The remote device is missing a vendor-supplied security patch.
File : cisco_asa_cve-2018-0101_dos.nasl - Type : ACT_KILL_HOST
2018-02-06Name : The packet inspection software installed on the remote host is affected by a ...
File : cisco-sa-20180129-asa1-ftd.nasl - Type : ACT_GATHER_INFO
2018-01-30Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20180129-asa1.nasl - Type : ACT_GATHER_INFO
2017-02-16Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20170208-asa.nasl - Type : ACT_GATHER_INFO
Hide | Show 15 More...
idDescription
2016-09-15Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20151021-asa-dns1.nasl - Type : ACT_GATHER_INFO
2016-09-15Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20151021-asa-dns2.nasl - Type : ACT_GATHER_INFO
2016-09-15Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20151021-asa-ike.nasl - Type : ACT_GATHER_INFO
2016-09-07Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20160817-asa-cli.nasl - Type : ACT_GATHER_INFO
2016-08-25Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sn-CSCva92151-asa.nasl - Type : ACT_GATHER_INFO
2016-02-29Name : The remote device is missing a vendor-supplied security patch.
File : cisco_ike_fragmentation_rce.nasl - Type : ACT_ATTACK
2016-02-12Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20160210-asa-ike.nasl - Type : ACT_GATHER_INFO
2015-04-17Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20150408-asa.nasl - Type : ACT_GATHER_INFO
2014-12-08Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sn-CVE-2014-3407-asa.nasl - Type : ACT_GATHER_INFO
2014-12-02Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sn-CVE-2014-3399-asa.nasl - Type : ACT_GATHER_INFO
2014-10-29Name : The remote Fedora host is missing a security update.
File : fedora_2014-13030.nasl - Type : ACT_GATHER_INFO
2014-08-28Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sn-CSCuj83344-asa.nasl - Type : ACT_GATHER_INFO
2014-07-18Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sn-CSCui45606-asa.nasl - Type : ACT_GATHER_INFO
2014-06-11Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sn-CSCun69561-asa.nasl - Type : ACT_GATHER_INFO
2011-03-09Name : The remote security device is missing a vendor-supplied security patch.
File : cisco-sa-20110223-asa.nasl - Type : ACT_GATHER_INFO