Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 314,615
With exploit
cisco / adaptive_security_appliance_software
You can search for specific versions with
https://synscan.net/product/adaptive_security_appliance_software/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2011-3309
Low
May 2, 2012
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2
== 8.2.2-interim
== 8.2.3
== 8.3(1)
== 8.3(2)
== 8.3.1-interim
== 8.3.1
== 8.3.2
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.4(2.11)
CVE-2011-4006
High
May 2, 2012
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2-interim
== 8.2.2
== 8.2.3
== 8.3(1)
== 8.3(2)
== 8.3.1-interim
== 8.3.1
== 8.3.2
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.4(2.11)
== 8.5
== 8.5(1)
== 8.5(1.4)
CVE-2012-0335
Medium
May 2, 2012
== 7.2
== 7.2(1)
== 7.2(1.22)
== 7.2(2)
== 7.2(2.5)
== 7.2(2.7)
== 7.2(2.8)
== 7.2(2.10)
== 7.2(2.14)
== 7.2(2.15)
== 7.2(2.16)
== 7.2(2.17)
== 7.2(2.18)
== 7.2(2.19)
== 7.2(2.48)
== 7.2(3)
== 7.2(4)
== 7.2(5)
== 7.2.1
== 7.2.2
== 7.2.3
== 7.2.4
== 7.2.5
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2
== 8.2.2-interim
== 8.2.3
== 8.3(1)
== 8.3(2)
== 8.3.1-interim
== 8.3.1
== 8.3.2
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.4(2.11)
CVE-2012-0355
High
Mar 15, 2012
== 8.4
== 8.4(1.11)
== 8.4(1)
== 8.4(2.11)
== 8.4(2)
== 8.5
== 8.5(1.4)
== 8.5(1)
CVE-2012-0356
High
Mar 15, 2012
== 7.0
== 7.0(0)
== 7.0(1)
== 7.0(2)
== 7.0(4)
== 7.0(5)
== 7.0(5.2)
== 7.0(6)
== 7.0(6.7)
== 7.0(7)
== 7.0(8)
== 7.0.1
== 7.0.1.4
== 7.0.2
== 7.0.4
== 7.0.4.3
== 7.0.5
== 7.0.6
== 7.0.7
== 7.0.8-interim
== 7.0.8
== 7.1
== 7.1(2)
== 7.1(2.5)
== 7.1(2.27)
== 7.1(2.48)
== 7.1(2.49)
== 7.1(5)
== 7.1.1
== 7.1.2
== 7.2
== 7.2(1)
== 7.2(1.22)
== 7.2(2)
== 7.2(2.5)
== 7.2(2.7)
== 7.2(2.8)
== 7.2(2.10)
== 7.2(2.14)
== 7.2(2.15)
== 7.2(2.16)
== 7.2(2.17)
== 7.2(2.18)
== 7.2(2.19)
== 7.2(2.48)
== 7.2(3)
== 7.2(4)
== 7.2(5)
== 7.2.1
== 7.2.2
== 7.2.3
== 7.2.4
== 7.2.5
== 8.0
== 8.0(2)
== 8.0(3)
== 8.0(4)
== 8.0(5)
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.1
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2
== 8.2.2-interim
== 8.2.3
== 8.3(1)
== 8.3(2)
== 8.3.1
== 8.3.1-interim
== 8.3.2
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.4(2.11)
== 8.5
== 8.5(1)
== 8.5(1.4)
CVE-2012-0358
High
Mar 15, 2012
== 7.0
== 7.0(0)
== 7.0(1)
== 7.0(2)
== 7.0(4)
== 7.0(5)
== 7.0(5.2)
== 7.0(6)
== 7.0(6.7)
== 7.0(7)
== 7.0(8)
== 7.0.1
== 7.0.1.4
== 7.0.2
== 7.0.4
== 7.0.4.3
== 7.0.5
== 7.0.6
== 7.0.7
== 7.0.8-interim
== 7.0.8
== 7.1
== 7.1(2)
== 7.1(2.5)
== 7.1(2.27)
== 7.1(2.48)
== 7.1(2.49)
== 7.1(5)
== 7.1.1
== 7.1.2
== 7.2
== 7.2(1)
== 7.2(1.22)
== 7.2(2)
== 7.2(2.5)
== 7.2(2.7)
== 7.2(2.8)
== 7.2(2.10)
== 7.2(2.14)
== 7.2(2.15)
== 7.2(2.16)
== 7.2(2.17)
== 7.2(2.18)
== 7.2(2.19)
== 7.2(2.48)
== 7.2(3)
== 7.2(4)
== 7.2(5)
== 7.2.1
== 7.2.2
== 7.2.3
== 7.2.4
== 7.2.5
== 8.0
== 8.0(2)
== 8.0(3)
== 8.0(4)
== 8.0(5)
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.1
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2
== 8.2.2-interim
== 8.2.3
== 8.3(1)
== 8.3(2)
== 8.3.1-interim
== 8.3.1
== 8.3.2
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.4(2.11)
== 8.5
== 8.6
== 8.6(1)
CVE-2012-0353
High
Mar 15, 2012
== 8.0
== 8.0(2)
== 8.0(3)
== 8.0(4)
== 8.0(5)
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.1
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2-interim
== 8.2.2
== 8.2.3
== 8.3(1)
== 8.3(2)
== 8.3.1-interim
== 8.3.1
== 8.3.2
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.5
CVE-2012-0354
High
Mar 15, 2012
== 8.0
== 8.0(2)
== 8.0(3)
== 8.0(4)
== 8.0(5)
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.1
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2-interim
== 8.2.2
== 8.2.3
== 8.3(1)
== 8.3(2)
== 8.3.1-interim
== 8.3.1
== 8.3.2
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.4(2.11)
== 8.5
== 8.5(1)
== 8.5(1.4)
== 8.6
CVE-2011-2060
Low
Oct 22, 2011
== 7.0
== 7.0(0)
== 7.0(1)
== 7.0(2)
== 7.0(4)
== 7.0(5)
== 7.0(5.2)
== 7.0(6)
== 7.0(6.7)
== 7.0(7)
== 7.0(8)
== 7.0.1
== 7.0.1.4
== 7.0.2
== 7.0.4
== 7.0.4.3
== 7.0.5
== 7.0.6
== 7.0.7
== 7.0.8-interim
== 7.0.8
== 7.1
== 7.2
== 7.2(1)
== 7.2(1.22)
== 7.2(2)
== 7.2(2.5)
== 7.2(2.7)
== 7.2(2.8)
== 7.2(2.10)
== 7.2(2.14)
== 7.2(2.15)
== 7.2(2.16)
== 7.2(2.17)
== 7.2(2.18)
== 7.2(2.19)
== 7.2(2.48)
== 7.2(3)
== 7.2(4)
== 7.2(5)
== 7.2.1
== 7.2.2
== 7.2.3
== 7.2.4
== 7.2.5
== 8.0
== 8.0(2)
== 8.0(3)
== 8.0(4)
== 8.0(5)
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.1
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2
== 8.2.2-interim
== 8.3(1)
== 8.3(2)
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.5
== 8.5(1)
CVE-2011-3298
High
Oct 6, 2011
== 7.0
== 7.0(0)
== 7.0(1)
== 7.0(2)
== 7.0(4)
== 7.0(5)
== 7.0(5.2)
== 7.0(6)
== 7.0(6.7)
== 7.0(7)
== 7.0(8)
== 7.0.1
== 7.0.1.4
== 7.0.2
== 7.0.4
== 7.0.4.3
== 7.0.5
== 7.0.6
== 7.0.7
== 7.0.8-interim
== 7.0.8
== 7.1
== 7.2
== 7.2(1)
== 7.2(1.22)
== 7.2(2)
== 7.2(2.5)
== 7.2(2.7)
== 7.2(2.8)
== 7.2(2.10)
== 7.2(2.14)
== 7.2(2.15)
== 7.2(2.16)
== 7.2(2.17)
== 7.2(2.18)
== 7.2(2.19)
== 7.2(2.48)
== 7.2(3)
== 7.2(4)
== 7.2(5)
== 7.2.1
== 7.2.2
== 7.2.3
== 7.2.4
== 7.2.5
== 8.0
== 8.0(2)
== 8.0(3)
== 8.0(4)
== 8.0(5)
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.1
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2
== 8.2.2-interim
== 8.3(1)
== 8.3(2)
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.5
== 8.5(1)
‹
›
‹
1
2
...
24
25
26
...
30
31
›