The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
Source: MITRE
Max CVSS
3.5
EPSS Score
0.25%
Published
2021-05-11
Updated
2023-04-01
A vulnerability in the local management (local-mgmt) CLI of Cisco UCS Manager Software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of CLI command parameters. An attacker could exploit this vulnerability by executing specific commands on the local-mgmt CLI on an affected device. A successful exploit could allow the attacker to cause internal system processes to fail to terminate properly, which could result in a buildup of stuck processes and lead to slowness in accessing the UCS Manager CLI and web UI. A sustained attack may result in a restart of internal UCS Manager processes and a temporary loss of access to the UCS Manager CLI and web UI.
Source: Cisco Systems, Inc.
Max CVSS
3.3
EPSS Score
0.04%
Published
2020-08-27
Updated
2023-04-20
vulnerability within the Multimedia Viewer feature of Cisco Webex Meetings could allow an authenticated, remote attacker to bypass security protections. The vulnerability is due to missing security warning dialog boxes when a room host views shared multimedia files. An authenticated, remote attacker could exploit this vulnerability by using the host role to share files within the Multimedia sharing feature and convincing a former room host to view that file. A warning dialog normally appears cautioning users before the file is displayed; however, the former host would not see that warning dialog, and any shared multimedia would be rendered within the user's browser. The attacker could leverage this behavior to conduct additional attacks by including malicious files within a targeted room host's browser window.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.07%
Published
2020-04-13
Updated
2020-04-14
A vulnerability in the ConfD server of the Cisco Elastic Services Controller (ESC) could allow an unauthenticated, local attacker to access sensitive information on a targeted system. The vulnerability is due to insufficient security restrictions. An attacker could exploit this vulnerability by accessing unauthorized information within the ConfD directory and file structure. Successful exploitation could allow the attacker to view sensitive information. Cisco Bug IDs: CSCvg00221.
Source: Cisco Systems, Inc.
Max CVSS
3.3
EPSS Score
0.04%
Published
2018-01-18
Updated
2020-09-04
Multiple cross-site scripting (XSS) vulnerabilities in the web framework in Cisco FireSIGHT Management Center (MC) 5.4.1.4 and 6.0.1 allow remote authenticated users to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuw88396.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.07%
Published
2015-11-12
Updated
2016-12-07
Multiple cross-site scripting (XSS) vulnerabilities in Cisco FireSight Management Center (MC) 5.4.1.3 and 6.0 allow remote authenticated users to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuv73338.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.07%
Published
2015-10-31
Updated
2016-12-07
Multiple cross-site scripting (XSS) vulnerabilities in Cisco FireSight Management Center (MC) 5.3.1.5 and 5.4.x through 5.4.1.3 allow remote authenticated users to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuu28922.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.07%
Published
2015-10-31
Updated
2016-12-07
Cisco Prime Infrastructure (PI) 1.4(0.45) and earlier, when AAA authentication is used, allows remote authenticated users to bypass intended access restrictions via a username with a modified composition of lowercase and uppercase characters, aka Bug ID CSum59958.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.09%
Published
2015-08-22
Updated
2017-01-04
The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416.
Source: Cisco Systems, Inc.
Max CVSS
3.6
EPSS Score
0.04%
Published
2015-07-03
Updated
2016-12-28
Cross-site scripting (XSS) vulnerability in Cisco FireSIGHT System Software 5.3.1.1 and 6.0.0 in FireSIGHT Management Center allows remote authenticated users to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCus85425.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.10%
Published
2015-04-23
Updated
2015-04-23
Cisco-Meraki MS, MR, and MX devices with firmware before 2014-09-24 allow remote attackers to obtain sensitive credential information by leveraging unspecified HTTP handler access on the local network, aka Cisco-Meraki defect ID 00302012.
Source: Cisco Systems, Inc.
Max CVSS
3.3
EPSS Score
0.20%
Published
2014-12-24
Updated
2014-12-24
Cross-site scripting (XSS) vulnerability in the web framework in Cisco Unified Communications Manager (UCM) 9.1(2.10000.28) allows remote authenticated users to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCuq68443.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.13%
Published
2014-09-12
Updated
2017-08-29
Cisco WebEx Meeting Center allows remote authenticated users to bypass access control and inject content from a different WebEx site via unspecified vectors, aka Bug ID CSCul36197.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.18%
Published
2013-12-14
Updated
2017-11-29
Cross-site scripting (XSS) vulnerability in the file-upload interface in Cisco Identity Services Engine (ISE) allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename, aka Bug ID CSCui67495.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.07%
Published
2013-10-16
Updated
2013-10-16
Cross-site scripting (XSS) vulnerability in the portal module in Cisco WebEx Social allows remote authenticated users to inject arbitrary web script or HTML via a javascript: URL in the link field in a post, aka Bug ID CSCue67199.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.07%
Published
2013-05-16
Updated
2013-05-16
The SSLVPN implementation in Cisco IOS 15.1 and 15.2, when DTLS is enabled, does not properly handle certain outbound ACL configurations, which allows remote authenticated users to cause a denial of service (device crash) via a session involving a PPP over ATM (PPPoA) interface, aka Bug ID CSCty97961.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.11%
Published
2012-09-16
Updated
2017-08-29
The SSLVPN implementation in Cisco IOS 12.4, 15.0, 15.1, and 15.2, when DTLS is not enabled, does not properly handle certain outbound ACL configurations, which allows remote authenticated users to cause a denial of service (device crash) via a session involving a PPP over ATM (PPPoA) interface, aka Bug ID CSCte41827.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.11%
Published
2012-09-16
Updated
2017-08-29
Cisco AnyConnect Secure Mobility Client 3.0 before 3.0.08057 allows remote authenticated users to cause a denial of service (vpnagentd process crash) via a crafted packet, aka Bug ID CSCty01670.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.11%
Published
2012-08-06
Updated
2012-08-06
Cisco IOS 15.1 and 15.2, when a clientless SSL VPN is configured, allows remote authenticated users to cause a denial of service (device reload) by using a web browser to refresh the SSL VPN portal page, as demonstrated by the Android browser, aka Bug ID CSCtr86328.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.11%
Published
2012-08-06
Updated
2013-04-02
Cisco IOS 12.4 and 15.0 through 15.2 allows physically proximate attackers to bypass the No Service Password-Recovery feature and read the start-up configuration via unspecified vectors, aka Bug ID CSCtr97640.
Source: Cisco Systems, Inc.
Max CVSS
3.6
EPSS Score
0.05%
Published
2012-05-02
Updated
2012-10-30
Cross-site scripting (XSS) vulnerability in the web interface in Cisco TelePresence System MXP Series F9.1 and earlier allows remote authenticated users to inject arbitrary web script or HTML via a crafted Call ID, as demonstrated by resultant cross-site request forgery (CSRF) attacks that change passwords or cause a denial of service, aka Bug ID CSCtq46488.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.18%
Published
2011-09-23
Updated
2018-10-09
The Cisco trial client on Linux for Cisco AnyConnect SSL VPN allows local users to overwrite arbitrary files via a symlink attack on unspecified temporary files.
Source: MITRE
Max CVSS
3.3
EPSS Score
0.04%
Published
2010-10-14
Updated
2010-11-11
The Cisco Security Monitoring, Analysis and Response System (CS-MARS) 6.0.4 and earlier stores cleartext passwords in log/sysbacktrace.## files within error-logs.tar.gz archives, which allows context-dependent attackers to obtain sensitive information by reading these files.
Source: MITRE
Max CVSS
3.3
EPSS Score
0.14%
Published
2009-08-27
Updated
2018-10-10
Cisco IOS XR 3.8.1 and earlier allows remote authenticated users to cause a denial of service (process crash) via vectors involving a BGP UPDATE message with many AS numbers prepended to the AS path.
Source: Cisco Systems, Inc.
Max CVSS
3.3
EPSS Score
0.10%
Published
2009-08-21
Updated
2009-08-21
Cross-site scripting (XSS) vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to inject arbitrary web script or HTML into the CCX database via unspecified vectors.
Source: Cisco Systems, Inc.
Max CVSS
3.5
EPSS Score
0.11%
Published
2009-07-16
Updated
2017-08-17
31 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!