This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/a:cisco:adaptive_security_appliance_software:9.9
Detail
VendorCiscoFirst view 2018-04-19
ProductAdaptive Security Appliance SoftwareLast view2019-10-02
Version9.9TypeApplication
Edition 
Language 
Update 
 
CPE Productcpe:/a:cisco:adaptive_security_appliance_software

Activity : Overall

Related : CVE

 DateAlertAccess VectorAccess ComplexityAuthentication
7.82019-10-02CVE-2019-15256NetworkLowNone Requ...
52019-05-03CVE-2019-1714NetworkLowNone Requ...
9.32019-05-03CVE-2019-1713NetworkMediumNone Requ...
7.82019-05-03CVE-2019-1708NetworkLowNone Requ...
7.82019-05-03CVE-2019-1706NetworkLowNone Requ...
Hide | Show 13 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
4.32019-05-03CVE-2019-1705NetworkMediumNone Requ...
3.52019-05-03CVE-2019-1701NetworkMediumRequires ...
7.82019-05-03CVE-2019-1697NetworkLowNone Requ...
6.12019-05-03CVE-2019-1695Adjacent ...LowNone Requ...
7.82019-05-03CVE-2019-1694NetworkLowNone Requ...
6.82019-05-03CVE-2019-1693NetworkLowRequires ...
7.82019-05-03CVE-2019-1687NetworkLowNone Requ...
7.82019-05-03CVE-2018-15388NetworkLowNone Requ...
5.52018-12-24CVE-2018-15465NetworkLowRequires ...
7.82018-11-01CVE-2018-15454NetworkLowNone Requ...
7.82018-10-05CVE-2018-15383NetworkLowNone Requ...
52018-06-07CVE-2018-0296NetworkLowNone Requ...
7.82018-04-19CVE-2018-0228NetworkLowNone Requ...

CWE : Common Weakness Enumeration

%idName
25% (4)CWE-20Improper Input Validation
18% (3)CWE-404Improper Resource Shutdown or Release
18% (3)CWE-400Uncontrolled Resource Consumption ('Resource Exhaustion')
12% (2)CWE-399Resource Management Errors
6% (1)CWE-352Cross-Site Request Forgery (CSRF)
Hide | Show 3 More...
%idName
6% (1)CWE-284Access Control (Authorization) Issues
6% (1)CWE-255Credentials Management
6% (1)CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting')

Snort® IPS/IDS

DateDescription
2019-01-15SIP over SCTP wildcard VIA address attempt
RuleID : 48593 - Type : PROTOCOL-VOIP - Revision : 1
2018-12-04SIP wildcard VIA address flood attempt
RuleID : 48265 - Type : PROTOCOL-VOIP - Revision : 2
2018-12-04SIP wildcard VIA address flood attempt
RuleID : 48264 - Type : PROTOCOL-VOIP - Revision : 2
2014-01-10SIP REGISTER flood attempt
RuleID : 20395 - Type : PROTOCOL-VOIP - Revision : 5
2014-01-10SIP REGISTER flood attempt
RuleID : 19389 - Type : PROTOCOL-VOIP - Revision : 8

Nessus® Vulnerability Scanner

idDescription
2018-12-21Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20181219-asa-privesc.nasl - Type : ACT_GATHER_INFO
2018-11-08Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20181031-asaftd-sip-dos-asa.nasl - Type : ACT_GATHER_INFO
2018-11-08Name : The packet inspection software installed on the remote host is affected by a ...
File : cisco-sa-20181031-asaftd-sip-dos-ftd.nasl - Type : ACT_GATHER_INFO
2018-10-04Name : The remote device is missing a vendor-supplied security patches.
File : cisco-sa-20181003-ftd-inspect-dos.nasl - Type : ACT_GATHER_INFO
2018-06-25Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20180606-asa.nasl - Type : ACT_GATHER_INFO
Hide | Show 1 More...
idDescription
2018-04-27Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20180418-asa1.nasl - Type : ACT_GATHER_INFO