This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/a:cisco:adaptive_security_appliance_software:8.3.2.31
Detail
VendorCiscoFirst view 2013-11-13
ProductAdaptive Security Appliance SoftwareLast view2017-08-07
Version8.3.2.31TypeApplication
Edition 
Language 
Update 
 
CPE Productcpe:/a:cisco:adaptive_security_appliance_software

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
 DateAlertAccess VectorAccess ComplexityAuthentication
4.32017-08-07CVE-2017-6770Adjacent ...MediumNone Requ...
4.32017-04-20CVE-2017-3793NetworkMediumNone Requ...
82017-02-09CVE-2017-3807NetworkLowRequires ...
7.12016-10-27CVE-2016-6431NetworkMediumNone Requ...
6.82016-08-18CVE-2016-6367LocalLowRequires ...
Hide | Show 20 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
8.52016-08-18CVE-2016-6366NetworkMediumRequires ...
7.82016-04-21CVE-2015-6360NetworkLowNone Requ...
102016-02-11CVE-2016-1287NetworkLowNone Requ...
7.82015-10-24CVE-2015-6327NetworkLowNone Requ...
7.82015-10-24CVE-2015-6326NetworkLowNone Requ...
7.12015-10-24CVE-2015-6325NetworkMediumNone Requ...
7.12015-04-12CVE-2015-0676NetworkMediumNone Requ...
42015-02-16CVE-2014-8023NetworkLowRequires ...
6.32015-02-06CVE-2013-5557NetworkMediumRequires ...
52014-11-27CVE-2014-3407NetworkLowNone Requ...
4.32014-10-10CVE-2014-3393NetworkMediumNone Requ...
8.32014-10-10CVE-2014-3392NetworkMediumNone Requ...
6.82014-10-10CVE-2014-3391LocalLowRequires ...
5.52014-10-07CVE-2014-3399NetworkLowRequires ...
6.82014-07-14CVE-2013-6691NetworkLowRequires ...
5.42014-07-14CVE-2013-5567NetworkHighNone Requ...
42014-06-18CVE-2014-2151NetworkLowRequires ...
6.32014-05-20CVE-2014-3264NetworkMediumRequires ...
4.32013-12-07CVE-2013-6707NetworkMediumNone Requ...

CWE : Common Weakness Enumeration

%idName
42% (11)CWE-20Improper Input Validation
23% (6)CWE-399Resource Management Errors
19% (5)CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
3% (1)CWE-400Uncontrolled Resource Consumption ('Resource Exhaustion')
3% (1)CWE-264Permissions, Privileges, and Access Controls
Hide | Show 2 More...
%idName
3% (1)CWE-94Failure to Control Generation of Code ('Code Injection')
3% (1)CWE-17Code

Information Assurance Vulnerability Management (IAVM)

idDescription
2015-A-0072Multiple Vulnerabilities in Cisco Adaptive Security Appliance (ASA) Software
Severity : Category I - VMSKEY : V0059859

Snort® IPS/IDS

DateDescription
2017-02-10Cisco ASA WebVPN memory corruption attempt
RuleID : 41538 - Type : SERVER-WEBAPP - Revision : 2
2016-10-01Cisco IOS commandline overflow attempt.
RuleID : 39987 - Type : INDICATOR-COMPROMISE - Revision : 2
2016-10-01Cisco IOS commandline overflow attempt
RuleID : 39986 - Type : INDICATOR-COMPROMISE - Revision : 2
2016-10-01Cisco IOS commandline overflow attempt.
RuleID : 39985 - Type : INDICATOR-COMPROMISE - Revision : 2
2016-10-01Cisco IOS commandline overflow attempt.
RuleID : 39984 - Type : INDICATOR-COMPROMISE - Revision : 2
Hide | Show 10 More...
DateDescription
2016-10-01Cisco IOS commandline overflow attempt
RuleID : 39983 - Type : INDICATOR-COMPROMISE - Revision : 2
2016-08-17Cisco ASA SNMP OID parsing stack buffer overflow attempt
RuleID : 39885 - Type : PROTOCOL-SNMP - Revision : 4
2016-03-14Cisco ASA IKEv2 invalid fragment length heap buffer overflow attempt
RuleID : 37676 - Type : SERVER-OTHER - Revision : 2
2016-03-14Cisco IOS invalid IKE fragment length memory corruption or exhaustion attempt
RuleID : 37675 - Type : SERVER-OTHER - Revision : 3
2016-03-15Cisco ASA IKEv1 invalid fragment length heap buffer overflow attempt
RuleID : 37674 - Type : SERVER-OTHER - Revision : 2
2016-03-14Cisco ASA IKEv2 invalid fragment length heap buffer overflow attempt
RuleID : 36903 - Type : SERVER-OTHER - Revision : 3
2015-04-10Cisco ASA memory exhaustion denial of service attempt
RuleID : 34051 - Type : PROTOCOL-DNS - Revision : 1
2014-11-16Cisco ASA WebVPN directory traversal attempt
RuleID : 32108 - Type : SERVER-WEBAPP - Revision : 2
2014-11-16Cisco ASA WebVPN directory traversal attempt
RuleID : 32107 - Type : SERVER-WEBAPP - Revision : 2
2014-11-16Cisco ASA WebVPN login.html memory corruption attempt
RuleID : 32101 - Type : SERVER-WEBAPP - Revision : 2

Nessus® Vulnerability Scanner

idDescription
2017-02-16Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20170208-asa.nasl - Type : ACT_GATHER_INFO
2016-10-26Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20161019-asa-ca.nasl - Type : ACT_GATHER_INFO
2016-09-15Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20151021-asa-dns1.nasl - Type : ACT_GATHER_INFO
2016-09-15Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20151021-asa-dns2.nasl - Type : ACT_GATHER_INFO
2016-09-15Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20151021-asa-ike.nasl - Type : ACT_GATHER_INFO
Hide | Show 18 More...
idDescription
2016-09-09Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-1063.nasl - Type : ACT_GATHER_INFO
2016-09-07Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20160817-asa-cli.nasl - Type : ACT_GATHER_INFO
2016-08-25Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sn-CSCva92151-asa.nasl - Type : ACT_GATHER_INFO
2016-06-22Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20160420-libsrtp-asa.nasl - Type : ACT_GATHER_INFO
2016-06-22Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20160420-libsrtp-iosxe.nasl - Type : ACT_GATHER_INFO
2016-04-05Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3539.nasl - Type : ACT_GATHER_INFO
2016-02-29Name : The remote device is missing a vendor-supplied security patch.
File : cisco_ike_fragmentation_rce.nasl - Type : ACT_ATTACK
2016-02-22Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_6171eb07d8a911e5b2bd002590263bf5.nasl - Type : ACT_GATHER_INFO
2016-02-12Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20160210-asa-ike.nasl - Type : ACT_GATHER_INFO
2016-01-19Name : The remote Debian host is missing a security update.
File : debian_DLA-393.nasl - Type : ACT_GATHER_INFO
2015-04-17Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20150408-asa.nasl - Type : ACT_GATHER_INFO
2014-12-08Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sn-CVE-2014-3407-asa.nasl - Type : ACT_GATHER_INFO
2014-12-02Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sn-CVE-2014-3399-asa.nasl - Type : ACT_GATHER_INFO
2014-10-29Name : The remote Fedora host is missing a security update.
File : fedora_2014-13030.nasl - Type : ACT_GATHER_INFO
2014-10-10Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20141008-asa.nasl - Type : ACT_GATHER_INFO
2014-08-28Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sn-CSCuj83344-asa.nasl - Type : ACT_GATHER_INFO
2014-07-18Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sn-CSCui45606-asa.nasl - Type : ACT_GATHER_INFO
2014-06-11Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sn-CSCun69561-asa.nasl - Type : ACT_GATHER_INFO