Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2011-01-07 |
Product | Adaptive Security Appliance Software | Last view | 2020-10-21 |
Version | 8.0.5.28 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:cisco:adaptive_security_appliance_software |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
3.7 | 2020-10-21 | CVE-2020-3585 | A vulnerability in the TLS handler of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 1000 Series firewalls could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper implementation of countermeasures against the Bleichenbacher attack for cipher suites that rely on RSA for key exchange. An attacker could exploit this vulnerability by sending crafted TLS messages to the device, which would act as an oracle and allow the attacker to carry out a chosen-ciphertext attack. A successful exploit could allow the attacker to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions to the affected device. To exploit this vulnerability, an attacker must be able to perform both of the following actions: Capture TLS traffic that is in transit between clients and the affected device Actively establish a considerable number of TLS connections to the affected device |
6.1 | 2020-10-21 | CVE-2020-3583 | Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. |
6.1 | 2020-10-21 | CVE-2020-3582 | Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. |
6.1 | 2020-10-21 | CVE-2020-3581 | Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. |
6.1 | 2020-10-21 | CVE-2020-3580 | Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. |
6.5 | 2020-10-21 | CVE-2020-3578 | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access rule and access parts of the WebVPN portal that are supposed to be blocked. The vulnerability is due to insufficient validation of URLs when portal access rules are configured. An attacker could exploit this vulnerability by accessing certain URLs on the affected device. |
7.8 | 2020-02-26 | CVE-2020-3167 | A vulnerability in the CLI of Cisco FXOS Software and Cisco UCS Manager Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS). The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including crafted arguments to specific commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS with the privileges of the currently logged-in user for all affected platforms excluding Cisco UCS 6400 Series Fabric Interconnects. On Cisco UCS 6400 Series Fabric Interconnects, the injected commands are executed with root privileges. |
6.7 | 2020-02-26 | CVE-2020-3166 | A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to read or write arbitrary files on the underlying operating system (OS). The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including crafted arguments to a specific CLI command. A successful exploit could allow the attacker to read or write to arbitrary files on the underlying OS. |
8.6 | 2019-10-02 | CVE-2019-15256 | A vulnerability in the Internet Key Exchange version 1 (IKEv1) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper management of system memory. An attacker could exploit this vulnerability by sending malicious IKEv1 traffic to an affected device. The attacker does not need valid credentials to authenticate the VPN session, nor does the attacker's source address need to match a peer statement in the crypto map applied to the ingress interface of the affected device. An exploit could allow the attacker to exhaust system memory resources, leading to a reload of an affected device. |
7.8 | 2019-08-07 | CVE-2019-1945 | Multiple vulnerabilities in the smart tunnel functionality of Cisco Adaptive Security Appliance (ASA) could allow an authenticated, local attacker to elevate privileges to the root user or load a malicious library file while the tunnel is being established. For more information about these vulnerabilities, see the Details section of this security advisory. |
7.3 | 2019-08-07 | CVE-2019-1944 | Multiple vulnerabilities in the smart tunnel functionality of Cisco Adaptive Security Appliance (ASA) could allow an authenticated, local attacker to elevate privileges to the root user or load a malicious library file while the tunnel is being established. For more information about these vulnerabilities, see the Details section of this security advisory. |
8.8 | 2019-08-07 | CVE-2019-1934 | A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to elevate privileges and execute administrative functions on an affected device. The vulnerability is due to insufficient authorization validation. An attacker could exploit this vulnerability by logging in to an affected device as a low-privileged user and then sending specific HTTPS requests to execute administrative functions using the information retrieved during initial login. |
8.6 | 2019-05-03 | CVE-2019-1714 | A vulnerability in the implementation of Security Assertion Markup Language (SAML) 2.0 Single Sign-On (SSO) for Clientless SSL VPN (WebVPN) and AnyConnect Remote Access VPN in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to successfully establish a VPN session to an affected device. The vulnerability is due to improper credential management when using NT LAN Manager (NTLM) or basic authentication. An attacker could exploit this vulnerability by opening a VPN session to an affected device after another VPN user has successfully authenticated to the affected device via SAML SSO. A successful exploit could allow the attacker to connect to secured networks behind the affected device. |
8.8 | 2019-05-03 | CVE-2019-1713 | A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the user has administrative privileges, the attacker could alter the configuration of, extract information from, or reload an affected device. |
8.6 | 2019-05-03 | CVE-2019-1708 | A vulnerability in the Internet Key Exchange Version 2 Mobility and Multihoming Protocol (MOBIKE) feature for the Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a memory leak or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to the incorrect processing of certain MOBIKE packets. An attacker could exploit this vulnerability by sending crafted MOBIKE packets to an affected device to be processed. A successful exploit could cause an affected device to continuously consume memory and eventually reload, resulting in a DoS condition. The MOBIKE feature is supported only for IPv4 addresses. |
8.6 | 2019-05-03 | CVE-2019-1706 | A vulnerability in the software cryptography module of the Cisco Adaptive Security Virtual Appliance (ASAv) and Firepower 2100 Series running Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an unexpected reload of the device that results in a denial of service (DoS) condition. The vulnerability is due to a logic error with how the software cryptography module handles IPsec sessions. An attacker could exploit this vulnerability by creating and sending traffic in a high number of IPsec sessions through the targeted device. A successful exploit could cause the device to reload and result in a DoS condition. |
5.9 | 2019-05-03 | CVE-2019-1705 | A vulnerability in the remote access VPN session manager of Cisco Adaptive Security Appliance (ASA) Software could allow a unauthenticated, remote attacker to cause a denial of service (DoS) condition on the remote access VPN services. The vulnerability is due to an issue with the remote access VPN session manager. An attacker could exploit this vulnerability by requesting an excessive number of remote access VPN sessions. An exploit could allow the attacker to cause a DoS condition. |
4.8 | 2019-05-03 | CVE-2019-1701 | Multiple vulnerabilities in the WebVPN service of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the WebVPN portal of an affected device. The vulnerabilities exist because the software insufficiently validates user-supplied input on an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. An attacker would need administrator privileges on the device to exploit these vulnerabilities. |
7.5 | 2019-05-03 | CVE-2019-1697 | A vulnerability in the implementation of the Lightweight Directory Access Protocol (LDAP) feature in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of LDAP packets sent to an affected device. An attacker could exploit these vulnerabilities by sending a crafted LDAP packet, using Basic Encoding Rules (BER), to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. |
6.5 | 2019-05-03 | CVE-2019-1695 | A vulnerability in the detection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to send data directly to the kernel of an affected device. The vulnerability exists because the software improperly filters Ethernet frames sent to an affected device. An attacker could exploit this vulnerability by sending crafted packets to the management interface of an affected device. A successful exploit could allow the attacker to bypass the Layer 2 (L2) filters and send data directly to the kernel of the affected device. A malicious frame successfully delivered would make the target device generate a specific syslog entry. |
8.6 | 2019-05-03 | CVE-2019-1694 | A vulnerability in the TCP processing engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper handling of TCP traffic. An attacker could exploit this vulnerability by sending a specific sequence of packets at a high rate through an affected device. A successful exploit could allow the attacker to temporarily disrupt traffic through the device while it reboots. |
6.5 | 2019-05-03 | CVE-2019-1693 | A vulnerability in the WebVPN service of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper management of authenticated sessions in the WebVPN portal. An attacker could exploit this vulnerability by authenticating with valid credentials and accessing a specific URL in the WebVPN portal. A successful exploit could allow the attacker to cause the device to reload, resulting in a temporary DoS condition. |
7.5 | 2019-05-03 | CVE-2019-1687 | A vulnerability in the TCP proxy functionality for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to an error in TCP-based packet inspection, which could cause the TCP packet to have an invalid Layer 2 (L2)-formatted header. An attacker could exploit this vulnerability by sending a crafted TCP packet sequence to the targeted device. A successful exploit could allow the attacker to cause a DoS condition. |
8.6 | 2019-05-03 | CVE-2018-15388 | A vulnerability in the WebVPN login process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause increased CPU utilization on an affected device. The vulnerability is due to excessive processing load for existing WebVPN login operations. An attacker could exploit this vulnerability by sending multiple WebVPN login requests to the device. A successful exploit could allow the attacker to increase CPU load on the device, resulting in a denial of service (DoS) condition. |
8.1 | 2018-12-24 | CVE-2018-15465 | A vulnerability in the authorization subsystem of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, but unprivileged (levels 0 and 1), remote attacker to perform privileged actions by using the web management interface. The vulnerability is due to improper validation of user privileges when using the web management interface. An attacker could exploit this vulnerability by sending specific HTTP requests via HTTPS to an affected device as an unprivileged user. An exploit could allow the attacker to retrieve files (including the running configuration) from the device or to upload and replace software images on the device. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
25% (15) | CWE-20 | Improper Input Validation |
21% (13) | CWE-399 | Resource Management Errors |
10% (6) | CWE-264 | Permissions, Privileges, and Access Controls |
8% (5) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
5% (3) | CWE-404 | Improper Resource Shutdown or Release |
5% (3) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
5% (3) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
1% (1) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
1% (1) | CWE-667 | Insufficient Locking |
1% (1) | CWE-415 | Double Free |
1% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |
1% (1) | CWE-295 | Certificate Issues |
1% (1) | CWE-287 | Improper Authentication |
1% (1) | CWE-254 | Security Features |
1% (1) | CWE-203 | Information Exposure Through Discrepancy |
1% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
1% (1) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
1% (1) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
1% (1) | CWE-17 | Code |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
72584 | Cisco Multiple Products Transparent Firewall Mode IPv6 Traffic Handling Exhau... |
72582 | Cisco Multiple Products Malformed Skinny Client Control Protocol (SCCP) Messa... |
70364 | Cisco Adaptive Security Appliances (ASA) IPv6 Stack Neighbor Discovery Router... |
70362 | Cisco Adaptive Security Appliances (ASA) EIGRP Multicast Storm Remote DoS |
70361 | Cisco Adaptive Security Appliances (ASA) Packet Saturation Remote DoS |
70360 | Cisco Adaptive Security Appliances (ASA) Multicast Traffic Unspecified Remote... |
70359 | Cisco Adaptive Security Appliances (ASA) TELNET Connection Interface Remote A... |
70358 | Cisco Adaptive Security Appliances (ASA) IPsec Traffic Saturation Remote DoS |
70357 | Cisco Adaptive Security Appliances (ASA) emWEB Document Name Space Character ... |
70356 | Cisco Adaptive Security Appliances (ASA) Configuration Pre-load Network Packe... |
70355 | Cisco Adaptive Security Appliances (ASA) OCSP Responder Connection Rejection ... |
70354 | Cisco Adaptive Security Appliances (ASA) WebVPN CIFS Share Access Restriction... |
70353 | Cisco Adaptive Security Appliances (ASA) Space Character SMTP Inspection Bypass |
70352 | Cisco Adaptive Security Appliances (ASA) Incorrect LDAP Authentication Attemp... |
70346 | Cisco Adaptive Security Appliances (ASA) SIP Inspection Feature Multiple SIP ... |
70345 | Cisco Adaptive Security Appliances (ASA) Unspecified Network Traffic Post-mig... |
70344 | Cisco Adaptive Security Appliances (ASA) Mobile User Security Service HTTP HE... |
70343 | Cisco Adaptive Security Appliances (ASA) Multicast Traffic Unspecified Remote... |
70342 | Cisco Adaptive Security Appliances (ASA) LAN-to-LAN IPsec Session Saturation ... |
70338 | Cisco Adaptive Security Appliances (ASA) Long URL ASDM Syslog Outage Remote DoS |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0072 | Multiple Vulnerabilities in Cisco Adaptive Security Appliance (ASA) Software Severity: Category I - VMSKEY: V0059859 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-05 | Cisco ASA running configuration download request detected RuleID : 50902 - Type : POLICY-OTHER - Revision : 2 |
2020-12-05 | Cisco ASA WebVPN expired session page direct access denial of service attempt RuleID : 50007 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Adaptive Security Appliance admin command interface access attempt RuleID : 49999 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Adaptive Security Appliance admin command interface access attempt RuleID : 49998 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco ASA secure desktop login denial of service attempt RuleID : 49996 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Adaptive Security Appliance admin REST API access attempt RuleID : 48644 - Type : POLICY-OTHER - Revision : 1 |
2019-01-15 | SIP over SCTP wildcard VIA address attempt RuleID : 48593 - Type : PROTOCOL-VOIP - Revision : 1 |
2018-12-04 | SIP wildcard VIA address flood attempt RuleID : 48265 - Type : PROTOCOL-VOIP - Revision : 2 |
2018-12-04 | SIP wildcard VIA address flood attempt RuleID : 48264 - Type : PROTOCOL-VOIP - Revision : 2 |
2020-12-05 | Cisco Adaptive Security Appliance directory traversal attempt RuleID : 46897 - Type : SERVER-WEBAPP - Revision : 1 |
2018-02-03 | Cisco ASA alloc_ch connection string RuleID : 45597 - Type : INDICATOR-SHELLCODE - Revision : 2 |
2018-02-03 | Cisco ASA VPN aggregateAuthDataHandler double free attempt RuleID : 45596 - Type : SERVER-OTHER - Revision : 3 |
2018-02-01 | Cisco ASA VPN aggregateAuthDataHandler double free attempt RuleID : 45575 - Type : SERVER-OTHER - Revision : 5 |
2017-02-10 | Cisco ASA WebVPN memory corruption attempt RuleID : 41538 - Type : SERVER-WEBAPP - Revision : 2 |
2016-10-01 | Cisco IOS commandline overflow attempt. RuleID : 39987 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2016-10-01 | Cisco IOS commandline overflow attempt RuleID : 39986 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2016-10-01 | Cisco IOS commandline overflow attempt. RuleID : 39985 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2016-10-01 | Cisco IOS commandline overflow attempt. RuleID : 39984 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2016-10-01 | Cisco IOS commandline overflow attempt RuleID : 39983 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2016-08-17 | Cisco ASA SNMP OID parsing stack buffer overflow attempt RuleID : 39885 - Type : PROTOCOL-SNMP - Revision : 4 |
2015-04-10 | Cisco ASA memory exhaustion denial of service attempt RuleID : 34051 - Type : PROTOCOL-DNS - Revision : 1 |
2014-01-10 | SIP REGISTER flood attempt RuleID : 20395 - Type : PROTOCOL-VOIP - Revision : 5 |
2014-01-10 | SIP REGISTER flood attempt RuleID : 19389 - Type : PROTOCOL-VOIP - Revision : 9 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-12-21 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20181219-asa-privesc.nasl - Type: ACT_GATHER_INFO |
2018-11-08 | Name: The packet inspection software installed on the remote host is affected by a ... File: cisco-sa-20181031-asaftd-sip-dos-ftd.nasl - Type: ACT_GATHER_INFO |
2018-11-08 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20181031-asaftd-sip-dos-asa.nasl - Type: ACT_GATHER_INFO |
2018-06-25 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180606-asa.nasl - Type: ACT_GATHER_INFO |
2018-04-27 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180418-asa1.nasl - Type: ACT_GATHER_INFO |
2018-02-26 | Name: The remote device is missing a vendor-supplied security patch. File: cisco_asa_cve-2018-0101_dos.nasl - Type: ACT_KILL_HOST |
2018-02-06 | Name: The packet inspection software installed on the remote host is affected by a ... File: cisco-sa-20180129-asa1-ftd.nasl - Type: ACT_GATHER_INFO |
2018-01-30 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180129-asa1.nasl - Type: ACT_GATHER_INFO |
2017-02-16 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170208-asa.nasl - Type: ACT_GATHER_INFO |
2016-10-26 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20161019-asa-ca.nasl - Type: ACT_GATHER_INFO |
2016-09-07 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20160817-asa-cli.nasl - Type: ACT_GATHER_INFO |
2016-08-25 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sn-CSCva92151-asa.nasl - Type: ACT_GATHER_INFO |
2015-04-17 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20150408-asa.nasl - Type: ACT_GATHER_INFO |
2014-12-08 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sn-CVE-2014-3407-asa.nasl - Type: ACT_GATHER_INFO |
2014-12-02 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sn-CVE-2014-3399-asa.nasl - Type: ACT_GATHER_INFO |
2014-10-29 | Name: The remote Fedora host is missing a security update. File: fedora_2014-13030.nasl - Type: ACT_GATHER_INFO |
2014-08-28 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sn-CSCuj83344-asa.nasl - Type: ACT_GATHER_INFO |
2014-07-18 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sn-CSCui45606-asa.nasl - Type: ACT_GATHER_INFO |
2014-06-11 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sn-CSCun69561-asa.nasl - Type: ACT_GATHER_INFO |
2011-03-09 | Name: The remote security device is missing a vendor-supplied security patch. File: cisco-sa-20110223-asa.nasl - Type: ACT_GATHER_INFO |