Vulnerability Database

With exploit

cisco / adaptive_security_appliance_software

Title Severity Exploit Date Affected Version
CVE-2015-0676 High Apr 13, 2015 == 7.0.2
== 9.1.5.15
== 7.0.1.4
== 8.4.4.5
== 9.3.1
== 7.2.4.25
== 9.0.4.7
== 8.6.1.1
== 9.0.4.29
== 8.3.2.34
== 9.1.6
== 7.0.7.4
== 9.0.4.26
== 9.2.2.7
== 8.0.3.6
== 7.2.2.18
== 8.4.3
== 8.4.3.8
== 7.2.4.30
== 8.4.4.9
== 8.3.2.40
== 7.2.5.4
== 8.0.4.23
== 8.1.1.6
== 8.0.4.32
== 8.3.2.39
== 8.3.1
== 7.1.2.24
== 7.0.6.4
== 7.0.4
== 8.6.1.14
== 8.6.1.2
== 8.7.1.4
== 8.4.4
== 8.2.5.50
== 9.1.2.8
== 7.0.8.13
== 8.0.4.28
== 8.2.2
== 8.5.1
== 9.0.3.6
== 8.0.5.31
== 8.0.4.25
== 7.2.2.10
== 8.0.2
== 9.2.2.8
== 8.7.1.8
== 9.2.1
== 8.3.1.1
== 7.1.2.16
== 8.0.5
== 7.2.4.6
== 9.1.4
== 7.0.8.12
== 7.2.4.18
== 8.2.2.17
== 9.3.1.1
== 8.0.1.2
== 7.1.2.61
== 8.2.5
== 8.2.2.9
== 8.4.4.3
== 8.0.4.16
== 7.1.2.81
== 8.1.2.19
== 8.2.5.26
== 7.0.5
== 7.2.2.19
== 8.0.5.20
== 7.2.4
== 8.0.4.9
== 8.1.2
== 8.3.2
== 7.0.4.2
== 8.0.5.27
== 7.1.2.38
== 7.2.3.1
== 8.0.4
== 8.1.2.13
== 8.7.1.3
== 9.2.3
== 8.4.7.23
== 9.3.2
== 8.4.1.11
== 8.3.2.13
== 8.0.4.33
== 7.2.5
== 7.2.5.10
== 7.2.5.8
== 9.2.3.3
== 8.6.1
== 8.3.2.33
== 8.7.1.1
== 7.0.7.9
== 8.4.2.8
== 7.1.2.28
== 7.1.2.20
== 8.4.7.22
== 8.4.2.1
== 8.2.5.13
== 7.2.4.33
== 9.0.3
== 9.0.2.10
== 8.0.3.19
== 7.0.1
== 8.2.4
== 7.0.3
== 7.2.3.12
== 8.6.1.12
== 8.2.2.16
== 8.7.1.13
== 7.2.1.9
== 9.0.3.8
== 9.1.3
== 8.1.2.24
== 8.3.2.23
== 8.1.2.55
== 7.1.2.42
== 7.2.2.22
== 8.5.1.21
== 7.0.6.29
== 7.0.7
== 7.1.2.64
== 9.1.5.21
== 7.0.5.12
== 8.3.1.6
== 9.0.1
== 8.2.5.52
== 7.2.2.6
== 8.5.1.18
== 8.0.3
== 8.0.2.15
== 7.2.4.9
== 8.2.5.40
== 7.2.5.12
== 9.0.4.1
== 8.5.1.14
== 9.0.4.24
== 8.2.5.57
== 8.4.3.9
== 8.3.2.25
== 9.1.1.4
== 8.4.1
== 8.4.4.1
== 7.2.2
== 7.0.6
== 8.4.6
== 9.1.2
== 8.4.1.3
== 8.3.2.41
== 7.2.5.7
== 7.0.7.1
== 8.7.1.11
== 8.0.2.11
== 8.2.1.11
== 7.2.2.34
== 9.1.5.10
== 8.2.5.46
== 7.2.3
== 7.0.6.26
== 8.5.1.7
== 8.1.2.49
== 8.2.1
== 8.1.2.23
== 7.1.2.49
== 8.2.4.1
== 9.0.4
== 7.0.6.32
== 8.2.2.12
== 8.0.5.25
== 8.5.1.19
== 8.2.3
== 8.3.2.31
== 9.2.2
== 9.1.5
== 9.0.4.5
== 8.0.4.3
== 9.0.2
== 8.7.1.7
== 8.6.1.10
== 9.1.3.2
== 8.5.1.6
== 9.2.2.4
== 9.3.2.2
== 7.2.1.19
== 8.4.7
== 8.2.5.22
== 8.4.7.26
== 8.4.5
== 7.2.4.27
== 7.1.2
== 7.0.7.12
== 8.5.1.1
== 9.1.5.12
== 8.6.1.5
== 8.2.5.48
== 9.1.1
== 8.4.5.6
== 7.0.6.8
== 8.3.1.4
== 8.2.5.33
== 8.2.5.41
== 8.1.2.50
== 9.0.4.20
== 9.0.4.17
== 8.3.2.44
== 8.2.4.4
== 8.4.2
== 7.0.8.8
== 7.1.2.46
== 7.2.1.24
== 8.2.2.10
== 7.0.6.18
== 7.2.3.16
== 7.0.8
== 8.1.2.16
== 8.0.5.23
== 8.2.5.55
== 8.3.2.37
== 8.1.2.56
== 7.0.6.22
== 8.4.7.3
== 8.1.2.15
== 9.1.4.5
== 7.2.2.14
== 7.2.5.2
== 8.0.5.28
== 7.2.1
== 8.1.1
== 8.0.4.31
== 8.7.1
== 7.1.2.72
== 7.1.2.53
== 8.0.3.12
== 8.3.2.4
== 8.5.1.17
== 8.6.1.13
== 8.4.7.15
== 7.2.1.13
== 8.2.0.45
== 7.0.8.2
CVE-2015-0677 High Apr 13, 2015 == 9.1.5.15
== 8.4.4.5
== 9.3.1
== 9.0.4.7
== 8.6.1.1
== 9.0.4.29
== 9.0.4.26
== 9.2.2.7
== 8.4.3
== 8.4.3.8
== 8.4.4.9
== 8.6.1.14
== 8.6.1.2
== 8.4.4
== 9.1.2.8
== 9.0.3.6
== 9.2.2.8
== 9.2.1
== 9.1.4
== 9.3.1.1
== 8.4.4.3
== 9.2.3
== 8.4.7.23
== 9.3.2
== 8.4.1.11
== 9.2.3.3
== 8.6.1
== 8.4.2.8
== 8.4.7.22
== 8.4.2.1
== 9.0.3
== 9.0.2.10
== 8.6.1.12
== 9.0.3.8
== 9.1.3
== 9.1.5.21
== 9.0.1
== 9.0.4.1
== 9.0.4.24
== 8.4.3.9
== 9.1.1.4
== 8.4.1
== 8.4.4.1
== 8.4.6
== 9.1.2
== 8.4.1.3
== 9.1.5.10
== 9.0.4
== 9.2.2
== 9.1.5
== 9.0.4.5
== 9.0.2
== 8.6.1.10
== 9.1.3.2
== 9.2.2.4
== 9.3.2.2
== 8.4.7
== 8.4.7.26
== 8.4.5
== 9.1.5.12
== 8.6.1.5
== 9.1.1
== 8.4.5.6
== 9.0.4.20
== 9.0.4.17
== 8.4.2
== 8.4.7.3
== 9.1.4.5
== 8.6.1.13
== 8.4.7.15
CVE-2014-8023 Low Feb 17, 2015 <= 9.2.3
CVE-2013-5557 Medium Feb 7, 2015 <= 9.1\(2\)
CVE-2014-3407 Medium Nov 28, 2014 <= 9.3\(2\)
CVE-2014-3390 Medium Oct 10, 2014 == 9.3.1
== 8.7.1.4
== 9.2.1
== 9.3.1.1
== 8.7.1.3
== 8.7.1.13
== 8.7.1.11
== 9.2.2
== 8.7.1.7
== 9.2.2.4
== 8.7.8
== 8.7.1
CVE-2014-3391 Medium Oct 10, 2014 == 8.4.4.5
== 8.3.2.34
== 8.4.3
== 8.4.3.8
== 8.4.4.9
== 8.3.2.40
== 8.3.2.39
== 8.3.1
== 8.7.1.4
== 8.4.4
== 8.2.5.50
== 8.2.2
== 8.3.1.1
== 8.2.2.17
== 8.2.5
== 8.4.4.3
== 8.2.5.26
== 8.3.2
== 8.2.1.1
== 8.7.1.3
== 8.4.1.11
== 8.3.2.13
== 8.3.2.33
== 8.4.2.8
== 8.4.7.22
== 8.4.2.1
== 8.2.5.13
== 8.2.4
== 8.2.2.16
== 8.7.1.13
== 8.3.2.23
== 8.3.1.6
== 8.2.5.40
== 8.4.3.9
== 8.3.2.25
== 8.4.1
== 8.4.4.1
== 8.4.6
== 8.4.1.3
== 8.3.2.41
== 8.7.1.11
== 8.2.5.46
== 8.2.1
== 8.2.4.1
== 8.2.2.12
== 8.2.3
== 8.3.2.31
== 8.7.1.7
== 8.4.7
== 8.2.5.22
== 8.4.5
== 8.2.5.48
== 8.4.5.6
== 8.3.1.4
== 8.2.5.33
== 8.2.5.41
== 8.2.4.4
== 8.4.2
== 8.2.2.10
== 8.7.8
== 8.3.2.37
== 8.4.7.3
== 8.7.1
== 8.3.2.4
== 8.4.7.15
== 8.2.0.45
CVE-2014-3392 High Oct 10, 2014 == 9.1.5.15
== 8.4.4.5
== 9.3.1
== 9.0.4.7
== 8.6.1.1
== 8.3.2.34
== 8.4.3
== 8.4.3.8
== 8.4.4.9
== 8.3.2.40
== 8.3.2.39
== 8.3.1
== 8.6.1.14
== 8.6.1.2
== 8.4.4
== 8.2.5.50
== 9.1.2.8
== 8.2.2
== 9.0.3.6
== 9.2.1
== 8.3.1.1
== 8.2
== 9.1.4
== 8.2.2.17
== 9.3.1.1
== 8.2.5
== 8.4.4.3
== 8.2.5.26
== 8.3.2
== 8.2.1.1
== 9.2.3
== 8.4.1.11
== 8.3.2.13
== 8.6.1
== 8.3.2.33
== 8.4.2.8
== 8.4.7.22
== 8.4.2.1
== 8.2.5.13
== 9.0.3
== 9.0.2.10
== 8.2.4
== 8.6.1.12
== 8.2.2.16
== 9.0.3.8
== 9.1.3
== 8.3.2.23
== 9.0
== 8.3.1.6
== 9.0.1
== 8.2.5.40
== 9.0.4.1
== 9.0.4.24
== 8.4.3.9
== 8.3.2.25
== 9.1.1.4
== 8.4.1
== 8.4.4.1
== 8.4.6
== 9.1.2
== 8.4.1.3
== 8.3.2.41
== 9.1.5.10
== 8.2.5.46
== 8.2.1
== 8.2.4.1
== 9.0.4
== 8.2.2.12
== 8.2.3
== 8.3.2.31
== 9.2.2
== 9.1.5
== 9.0.4.5
== 9.0.2
== 8.6.1.10
== 9.1.3.2
== 9.2.2.4
== 8.4.7
== 8.2.5.22
== 8.4.5
== 8.4
== 9.1.5.12
== 8.6.1.5
== 8.2.5.48
== 9.1.1
== 8.4.5.6
== 8.3.1.4
== 8.2.5.33
== 8.2.5.41
== 9.0.4.20
== 9.0.4.17
== 8.2.4.4
== 8.4.2
== 8.2.2.10
== 8.6
== 8.3.2.37
== 8.4.7.3
== 8.3.2.4
== 8.6.1.13
== 8.4.7.15
== 9.1
== 8.2.0.45
== 9.3
== 8.3
== 9.2.0
CVE-2014-3393 Low Oct 10, 2014 == 9.1.5.15
== 8.4.4.5
== 9.0.4.7
== 8.6.1.1
== 8.3.2.34
== 8.4.3
== 8.4.3.8
== 8.4.4.9
== 8.3.2.40
== 8.3.2.39
== 8.3.1
== 8.6.1.14
== 8.6.1.2
== 8.4.4
== 8.2.5.50
== 9.1.2.8
== 8.2.2
== 9.0.3.6
== 9.2.1
== 8.3.1.1
== 8.2
== 9.1.4
== 8.2.2.17
== 8.2.5
== 8.4.4.3
== 8.2.5.26
== 8.3.2
== 8.2.1.1
== 9.2.3
== 8.4.1.11
== 8.3.2.13
== 8.6.1
== 8.3.2.33
== 8.4.2.8
== 8.4.7.22
== 8.4.2.1
== 8.2.5.13
== 9.0.3
== 9.0.2.10
== 8.2.4
== 8.6.1.12
== 8.2.2.16
== 9.0.3.8
== 9.1.3
== 8.3.2.23
== 9.0
== 8.3.1.6
== 9.0.1
== 8.2.5.40
== 9.0.4.1
== 9.0.4.24
== 8.4.3.9
== 8.3.2.25
== 9.1.1.4
== 8.4.1
== 8.4.4.1
== 8.4.6
== 9.1.2
== 8.4.1.3
== 8.3.2.41
== 9.1.5.10
== 8.2.5.46
== 8.2.1
== 8.2.4.1
== 9.0.4
== 8.2.2.12
== 8.2.3
== 8.3.2.31
== 9.2.2
== 9.1.5
== 9.0.4.5
== 9.0.2
== 8.6.1.10
== 9.1.3.2
== 9.2.2.4
== 8.4.7
== 8.2.5.22
== 8.4.5
== 8.4
== 9.1.5.12
== 8.6.1.5
== 8.2.5.48
== 9.1.1
== 8.4.5.6
== 8.3.1.4
== 8.2.5.33
== 8.2.5.41
== 9.0.4.20
== 9.0.4.17
== 8.2.4.4
== 8.4.2
== 8.2.2.10
== 8.6
== 8.3.2.37
== 8.4.7.3
== 8.3.2.4
== 8.6.1.13
== 8.4.7.15
== 9.1
== 8.2.0.45
== 8.3
== 9.2.0
CVE-2014-3394 Medium Oct 10, 2014 == 8.2.0.45
== 8.2.1
== 8.2.1.1
== 8.2.2
== 8.2.2.10
== 8.2.2.12
== 8.2.2.16
== 8.2.2.17
== 8.2.3
== 8.2.4
== 8.2.4.1
== 8.2.4.4
== 8.2.5
== 8.2.5.13
== 8.2.5.22
== 8.2.5.26
== 8.2.5.33
== 8.2.5.40
== 8.2.5.41
== 8.2.5.46
== 8.2.5.48
== 8.4.1
== 8.4.1.3
== 8.4.1.11
== 8.4.2
== 8.4.2.1
== 8.4.2.8
== 8.4.3
== 8.4.3.8
== 8.4.3.9
== 8.4.4
== 8.4.4.1
== 8.4.4.3
== 8.4.4.5
== 8.4.4.9
== 8.4.5
== 8.4.5.6
== 8.4.6
== 8.4.7
== 8.4.7.3
== 8.6.1
== 8.6.1.1
== 8.6.1.2
== 8.6.1.5
== 8.6.1.10
== 8.6.1.12
== 8.6.1.13
== 8.7.1
== 8.7.1.3
== 8.7.1.4
== 8.7.1.7
== 8.7.1.11
== 9.0.1
== 9.0.2
== 9.0.2.10
== 9.0.3
== 9.0.3.6
== 9.0.3.8
== 9.0.4
== 9.0.4.1
== 9.0.4.5
== 9.0.4.7
== 9.1.1
== 9.1.1.4
== 9.1.2
== 9.1.2.8
== 9.1.3
== 9.1.3.2
== 9.1.4
== 9.1.5