Vulnerability Database

With exploit

cisco / adaptive_security_appliance_software

Title Severity Exploit Date Affected Version
CVE-2011-0393 High Feb 25, 2011 <= 8.3\(1\)
== 7.0
== 7.0(0)
== 7.0(2)
== 7.0(4)
== 7.0(5)
== 7.0(5.2)
== 7.0(6.7)
== 7.0.1
== 7.0.1.4
== 7.0.2
== 7.0.4
== 7.0.4.3
== 7.0.5
== 7.0.6
== 7.0.7
== 7.0.8-interim
== 7.0.8
== 7.1
== 7.1(2)
== 7.1(2.5)
== 7.1(2.27)
== 7.1(2.48)
== 7.1(2.49)
== 7.1(5)
== 7.1.1
== 7.1.2
== 7.2
== 7.2(1)
== 7.2(1.22)
== 7.2(2)
== 7.2(2.5)
== 7.2(2.7)
== 7.2(2.8)
== 7.2(2.10)
== 7.2(2.14)
== 7.2(2.15)
== 7.2(2.16)
== 7.2(2.17)
== 7.2(2.18)
== 7.2(2.19)
== 7.2(2.48)
== 7.2.1
== 7.2.2
== 7.2.3
== 7.2.4
== 7.2.5
== 8.0
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2.1
== 8.2.2-interim
== 8.2.2
CVE-2011-0394 High Feb 25, 2011 <= 8.3\(1\)
== 7.0
== 7.0(0)
== 7.0(2)
== 7.0(4)
== 7.0(5)
== 7.0(5.2)
== 7.0(6.7)
== 7.0.1
== 7.0.1.4
== 7.0.2
== 7.0.4
== 7.0.4.3
== 7.0.5
== 7.0.6
== 7.0.7
== 7.0.8-interim
== 7.0.8
== 7.1
== 7.1(2)
== 7.1(2.5)
== 7.1(2.27)
== 7.1(2.48)
== 7.1(2.49)
== 7.1(5)
== 7.1.1
== 7.1.2
== 7.2
== 7.2(1)
== 7.2(1.22)
== 7.2(2)
== 7.2(2.5)
== 7.2(2.7)
== 7.2(2.8)
== 7.2(2.10)
== 7.2(2.14)
== 7.2(2.15)
== 7.2(2.16)
== 7.2(2.17)
== 7.2(2.18)
== 7.2(2.19)
== 7.2(2.48)
== 7.2.1
== 7.2.2
== 7.2.3
== 7.2.4
== 7.2.5
== 8.0
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2.1
== 8.2.2-interim
== 8.2.2
CVE-2011-0395 High Feb 25, 2011 == 8.0
== 8.3(1)
CVE-2011-0396 High Feb 25, 2011 == 8.0
== 8.3(1)
CVE-2010-4688 High Jan 8, 2011 <= 8.3\(1\)
== 7.0
== 7.0(0)
== 7.0(2)
== 7.0(4)
== 7.0(5)
== 7.0(5.2)
== 7.0(6.7)
== 7.0.1
== 7.0.1.4
== 7.0.2
== 7.0.4
== 7.0.4.3
== 7.0.5
== 7.0.6
== 7.0.7
== 7.0.8-interim
== 7.0.8
== 7.1
== 7.1(2)
== 7.1(2.5)
== 7.1(2.27)
== 7.1(2.48)
== 7.1(2.49)
== 7.1(5)
== 7.1.1
== 7.1.2
== 7.2
== 7.2(1)
== 7.2(1.22)
== 7.2(2)
== 7.2(2.5)
== 7.2(2.7)
== 7.2(2.8)
== 7.2(2.10)
== 7.2(2.14)
== 7.2(2.15)
== 7.2(2.16)
== 7.2(2.17)
== 7.2(2.18)
== 7.2(2.19)
== 7.2(2.48)
== 7.2.1
== 7.2.2
== 7.2.3
== 7.2.4
== 7.2.5
== 8.0
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2.1
== 8.2.2-interim
== 8.2.2
CVE-2010-4689 High Jan 8, 2011 <= 8.3\(1\)
== 7.0
== 7.0(0)
== 7.0(2)
== 7.0(4)
== 7.0(5)
== 7.0(5.2)
== 7.0(6.7)
== 7.0.1
== 7.0.1.4
== 7.0.2
== 7.0.4
== 7.0.4.3
== 7.0.5
== 7.0.6
== 7.0.7
== 7.0.8-interim
== 7.0.8
== 7.1
== 7.1(2)
== 7.1(2.5)
== 7.1(2.27)
== 7.1(2.48)
== 7.1(2.49)
== 7.1(5)
== 7.1.1
== 7.1.2
== 7.2
== 7.2(1)
== 7.2(1.22)
== 7.2(2)
== 7.2(2.5)
== 7.2(2.7)
== 7.2(2.8)
== 7.2(2.10)
== 7.2(2.14)
== 7.2(2.15)
== 7.2(2.16)
== 7.2(2.17)
== 7.2(2.18)
== 7.2(2.19)
== 7.2(2.48)
== 7.2.1
== 7.2.2
== 7.2.3
== 7.2.4
== 7.2.5
== 8.0
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2.1
== 8.2.2-interim
== 8.2.2
CVE-2010-4690 Medium Jan 8, 2011 <= 8.3\(1\)
== 7.0
== 7.0(0)
== 7.0(2)
== 7.0(4)
== 7.0(5)
== 7.0(5.2)
== 7.0(6.7)
== 7.0.1
== 7.0.1.4
== 7.0.2
== 7.0.4
== 7.0.4.3
== 7.0.5
== 7.0.6
== 7.0.7
== 7.0.8-interim
== 7.0.8
== 7.1
== 7.1(2)
== 7.1(2.5)
== 7.1(2.27)
== 7.1(2.48)
== 7.1(2.49)
== 7.1(5)
== 7.1.1
== 7.1.2
== 7.2
== 7.2(1)
== 7.2(1.22)
== 7.2(2)
== 7.2(2.5)
== 7.2(2.7)
== 7.2(2.8)
== 7.2(2.10)
== 7.2(2.14)
== 7.2(2.15)
== 7.2(2.16)
== 7.2(2.17)
== 7.2(2.18)
== 7.2(2.19)
== 7.2(2.48)
== 7.2.1
== 7.2.2
== 7.2.3
== 7.2.4
== 7.2.5
== 8.0
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2.1
== 8.2.2-interim
== 8.2.2
CVE-2010-4691 High Jan 8, 2011 <= 8.3\(1\)
== 7.0
== 7.0(0)
== 7.0(2)
== 7.0(4)
== 7.0(5)
== 7.0(5.2)
== 7.0(6.7)
== 7.0.1
== 7.0.1.4
== 7.0.2
== 7.0.4
== 7.0.4.3
== 7.0.5
== 7.0.6
== 7.0.7
== 7.0.8-interim
== 7.0.8
== 7.1
== 7.1(2)
== 7.1(2.5)
== 7.1(2.27)
== 7.1(2.48)
== 7.1(2.49)
== 7.1(5)
== 7.1.1
== 7.1.2
== 7.2
== 7.2(1)
== 7.2(1.22)
== 7.2(2)
== 7.2(2.5)
== 7.2(2.7)
== 7.2(2.8)
== 7.2(2.10)
== 7.2(2.14)
== 7.2(2.15)
== 7.2(2.16)
== 7.2(2.17)
== 7.2(2.18)
== 7.2(2.19)
== 7.2(2.48)
== 7.2.1
== 7.2.2
== 7.2.3
== 7.2.4
== 7.2.5
== 8.0
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2.1
== 8.2.2-interim
== 8.2.2
CVE-2010-4692 High Jan 8, 2011 <= 8.3\(1\)
== 7.0
== 7.0(0)
== 7.0(2)
== 7.0(4)
== 7.0(5)
== 7.0(5.2)
== 7.0(6.7)
== 7.0.1
== 7.0.1.4
== 7.0.2
== 7.0.4
== 7.0.4.3
== 7.0.5
== 7.0.6
== 7.0.7
== 7.0.8-interim
== 7.0.8
== 7.1
== 7.1(2)
== 7.1(2.5)
== 7.1(2.27)
== 7.1(2.48)
== 7.1(2.49)
== 7.1(5)
== 7.1.1
== 7.1.2
== 7.2
== 7.2(1)
== 7.2(1.22)
== 7.2(2)
== 7.2(2.5)
== 7.2(2.7)
== 7.2(2.8)
== 7.2(2.10)
== 7.2(2.14)
== 7.2(2.15)
== 7.2(2.16)
== 7.2(2.17)
== 7.2(2.18)
== 7.2(2.19)
== 7.2(2.48)
== 7.2.1
== 7.2.2
== 7.2.3
== 7.2.4
== 7.2.5
== 8.0
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2.1
== 8.2.2-interim
== 8.2.2
CVE-2009-5037 Medium Jan 7, 2011 <= 8.2\(2\)
== 7.0
== 7.0(0)
== 7.0(2)
== 7.0(4)
== 7.0(5)
== 7.0(5.2)
== 7.0(6.7)
== 7.0.1
== 7.0.1.4
== 7.0.2
== 7.0.4
== 7.0.4.3
== 7.0.5
== 7.0.6
== 7.0.7
== 7.0.8-interim
== 7.0.8
== 7.1
== 7.1(2)
== 7.1(2.5)
== 7.1(2.27)
== 7.1(2.48)
== 7.1(2.49)
== 7.1(5)
== 7.1.1
== 7.1.2
== 7.2
== 7.2(1)
== 7.2(1.22)
== 7.2(2)
== 7.2(2.5)
== 7.2(2.7)
== 7.2(2.8)
== 7.2(2.10)
== 7.2(2.14)
== 7.2(2.15)
== 7.2(2.16)
== 7.2(2.17)
== 7.2(2.18)
== 7.2(2.19)
== 7.2(2.48)
== 7.2.1
== 7.2.2
== 7.2.3
== 7.2.4
== 7.2.5
== 8.0
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.2(1)
== 8.2.1
== 8.2.2-interim
== 8.2.2