Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2014-0661

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-22 Jan, 2014 | 21:00
Updated At-06 Aug, 2024 | 09:20
Rejected At-
Credits

The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:22 Jan, 2014 | 21:00
Updated At:06 Aug, 2024 | 09:20
Rejected At:
▼CVE Numbering Authority (CNA)

The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://osvdb.org/102362
vdb-entry
x_refsource_OSVDB
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts
vendor-advisory
x_refsource_CISCO
https://exchange.xforce.ibmcloud.com/vulnerabilities/90624
vdb-entry
x_refsource_XF
http://www.securityfocus.com/bid/65071
vdb-entry
x_refsource_BID
http://secunia.com/advisories/56533
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id/1029656
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://osvdb.org/102362
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/90624
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.securityfocus.com/bid/65071
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://secunia.com/advisories/56533
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id/1029656
Resource:
vdb-entry
x_refsource_SECTRACK
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://osvdb.org/102362
vdb-entry
x_refsource_OSVDB
x_transferred
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts
vendor-advisory
x_refsource_CISCO
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/90624
vdb-entry
x_refsource_XF
x_transferred
http://www.securityfocus.com/bid/65071
vdb-entry
x_refsource_BID
x_transferred
http://secunia.com/advisories/56533
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id/1029656
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://osvdb.org/102362
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/90624
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.securityfocus.com/bid/65071
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://secunia.com/advisories/56533
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id/1029656
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@cisco.com
Published At:22 Jan, 2014 | 21:55
Updated At:11 Apr, 2025 | 00:51

The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.08.3HIGH
AV:A/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 8.3
Base severity: HIGH
Vector:
AV:A/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Cisco Systems, Inc.
cisco
>>telepresence_system_software>>Versions up to 1.10.1\(43\)(inclusive)
cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.5.10\(3648\)
cpe:2.3:a:cisco:telepresence_system_software:1.5.10\(3648\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.7.5\(42\)
cpe:2.3:a:cisco:telepresence_system_software:1.7.5\(42\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.7.6\(4\)
cpe:2.3:a:cisco:telepresence_system_software:1.7.6\(4\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.8.0\(55\)
cpe:2.3:a:cisco:telepresence_system_software:1.8.0\(55\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.8.1\(34\)
cpe:2.3:a:cisco:telepresence_system_software:1.8.1\(34\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.8.2\(11\)
cpe:2.3:a:cisco:telepresence_system_software:1.8.2\(11\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.8.3\(4\)
cpe:2.3:a:cisco:telepresence_system_software:1.8.3\(4\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.8.4\(13\)
cpe:2.3:a:cisco:telepresence_system_software:1.8.4\(13\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.8.5\(4\)
cpe:2.3:a:cisco:telepresence_system_software:1.8.5\(4\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.9.0\(46\)
cpe:2.3:a:cisco:telepresence_system_software:1.9.0\(46\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.9.1\(68\)
cpe:2.3:a:cisco:telepresence_system_software:1.9.1\(68\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.9.2\(19\)
cpe:2.3:a:cisco:telepresence_system_software:1.9.2\(19\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.9.3\(44\)
cpe:2.3:a:cisco:telepresence_system_software:1.9.3\(44\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.9.4\(19\)
cpe:2.3:a:cisco:telepresence_system_software:1.9.4\(19\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.9.5\(7\)
cpe:2.3:a:cisco:telepresence_system_software:1.9.5\(7\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.9.6\(2\)
cpe:2.3:a:cisco:telepresence_system_software:1.9.6\(2\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.9.6.1\(3\)
cpe:2.3:a:cisco:telepresence_system_software:1.9.6.1\(3\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.10.0
cpe:2.3:a:cisco:telepresence_system_software:1.10.0:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.10.0\(259\)
cpe:2.3:a:cisco:telepresence_system_software:1.10.0\(259\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>1.10.1
cpe:2.3:a:cisco:telepresence_system_software:1.10.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_1000>>-
cpe:2.3:h:cisco:telepresence_system_1000:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_1300-65>>-
cpe:2.3:h:cisco:telepresence_system_1300-65:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_3000>>*
cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_3010>>*
cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_3200>>*
cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_3210>>*
cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_500-37>>-
cpe:2.3:h:cisco:telepresence_system_500-37:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>Versions up to 6.0.3\(33\)(inclusive)
cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>6.0.0.1\(4\)
cpe:2.3:a:cisco:telepresence_system_software:6.0.0.1\(4\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>6.0.1\(50\)
cpe:2.3:a:cisco:telepresence_system_software:6.0.1\(50\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>6.0.2\(28\)
cpe:2.3:a:cisco:telepresence_system_software:6.0.2\(28\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_software>>6.1.0\(90\)
cpe:2.3:a:cisco:telepresence_system_software:6.1.0\(90\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_1100>>-
cpe:2.3:h:cisco:telepresence_system_1100:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_500-32>>-
cpe:2.3:h:cisco:telepresence_system_500-32:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_tx1300_47>>*
cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_tx1310_65>>*
cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_tx9000>>*
cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_system_tx9200>>*
cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarynvd@nist.gov
CWE ID: CWE-94
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://osvdb.org/102362psirt@cisco.com
N/A
http://secunia.com/advisories/56533psirt@cisco.com
N/A
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-ctspsirt@cisco.com
Vendor Advisory
http://www.securityfocus.com/bid/65071psirt@cisco.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1029656psirt@cisco.com
Third Party Advisory
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/90624psirt@cisco.com
N/A
http://osvdb.org/102362af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/56533af854a3a-2127-422b-91ae-364da2661108
N/A
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-ctsaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/65071af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1029656af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/90624af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://osvdb.org/102362
Source: psirt@cisco.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/56533
Source: psirt@cisco.com
Resource: N/A
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts
Source: psirt@cisco.com
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/65071
Source: psirt@cisco.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1029656
Source: psirt@cisco.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/90624
Source: psirt@cisco.com
Resource: N/A
Hyperlink: http://osvdb.org/102362
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/56533
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/65071
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1029656
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/90624
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

60Records found

CVE-2012-0363
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9||HIGH
EPSS-1.92% / 82.60%
||
7 Day CHG~0.00%
Published-25 Feb, 2012 | 02:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web interface on Cisco SRP 520 series devices with firmware before 1.1.26 and SRP 520W-U and 540 series devices with firmware before 1.2.4 allows remote authenticated users to execute arbitrary commands via unspecified vectors, related to a "command injection vulnerability," aka Bug ID CSCtt46871.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-small_business_srp520_series_firmwaresmall_business_srp526w-usmall_business_srp521w-usmall_business_srp547wsmall_business_srp527wsmall_business_srp546wsmall_business_srp540_series_firmwaresmall_business_srp520-u_series_firmwaresmall_business_srp526wsmall_business_srp527w-usmall_business_srp521wsmall_business_srp541wn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2011-4237
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.28% / 50.67%
||
7 Day CHG~0.00%
Published-03 May, 2012 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CRLF injection vulnerability in autologin.jsp in Cisco CiscoWorks Common Services 4.0, as used in Cisco Prime LAN Management Solution and other products, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the URL parameter, aka Bug ID CSCtu18693.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-prime_lan_management_solutionciscoworks_common_servicesn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2011-3285
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.28% / 50.67%
||
7 Day CHG~0.00%
Published-02 May, 2012 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CRLF injection vulnerability in /+CSCOE+/logon.html on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 through 8.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors, aka Bug ID CSCth63101.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-5500_series_adaptive_security_applianceadaptive_security_appliance_softwaren/a
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2011-3310
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9||HIGH
EPSS-27.53% / 96.24%
||
7 Day CHG~0.00%
Published-20 Oct, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Home Page component in Cisco CiscoWorks Common Services before 4.1 on Windows, as used in CiscoWorks LAN Management Solution, Cisco Security Manager, Cisco Unified Service Monitor, Cisco Unified Operations Manager, CiscoWorks QoS Policy Manager, and CiscoWorks Voice Manager, allows remote authenticated users to execute arbitrary commands via a crafted URL, aka Bug IDs CSCtq48990, CSCtq63992, CSCtq64011, CSCtq64019, CSCtr23090, and CSCtt25535.

Action-Not Available
Vendor-n/aCisco Systems, Inc.Microsoft Corporation
Product-windowsciscoworks_common_servicesn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2011-2585
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-2.57% / 84.96%
||
7 Day CHG~0.00%
Published-20 Oct, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Show and Share 5(2), 5.2(1), and 5.2(2) before 5.2(2.1) allows remote authenticated users to upload and execute arbitrary code by leveraging video upload privileges, aka Bug ID CSCto69857.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-show_and_sharen/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2011-0364
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-10||HIGH
EPSS-15.54% / 94.41%
||
7 Day CHG~0.00%
Published-18 Feb, 2011 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Management Console (webagent.exe) in Cisco Security Agent 5.1, 5.2, and 6.0 before 6.0.2.145 allows remote attackers to create arbitrary files and execute arbitrary code via unspecified parameters in a crafted st_upload request.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-security_agentn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2009-0625
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.66% / 70.26%
||
7 Day CHG~0.00%
Published-26 Feb, 2009 | 16:00
Updated-16 Sep, 2024 | 22:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.2) and Cisco ACE 4710 Application Control Engine Appliance before A1(8.0) allows remote attackers to cause a denial of service (device reload) via a crafted SNMPv3 packet.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-catalystace_4710application_control_engine_modulen/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2020-3513
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.19% / 41.73%
||
7 Day CHG~0.00%
Published-24 Sep, 2020 | 17:51
Updated-13 Nov, 2024 | 18:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software for Cisco ASR 900 Series Route Switch Processor 3 Arbitrary Code Execution Vulnerabilities

Multiple vulnerabilities in the initialization routines that are executed during bootup of Cisco IOS XE Software for Cisco ASR 900 Series Aggregation Services Routers with a Route Switch Processor 3 (RSP3) installed could allow an authenticated, local attacker with high privileges to execute persistent code at bootup and break the chain of trust. These vulnerabilities are due to incorrect validations by boot scripts when specific ROM monitor (ROMMON) variables are set. An attacker could exploit these vulnerabilities by copying a specific file to the local file system of an affected device and defining specific ROMMON variables. A successful exploit could allow the attacker to run arbitrary code on the underlying operating system (OS) with root privileges. To exploit these vulnerabilities, an attacker would need to have access to the root shell on the device or have physical access to the device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeasr_903ncs_4216_f2bncs_4206ncs_4216asr_907asr_902Cisco IOS XE Software
CWE ID-CWE-749
Exposed Dangerous Method or Function
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2020-3416
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.19% / 41.73%
||
7 Day CHG~0.00%
Published-24 Sep, 2020 | 18:01
Updated-13 Nov, 2024 | 17:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software for Cisco ASR 900 Series Route Switch Processor 3 Arbitrary Code Execution Vulnerabilities

Multiple vulnerabilities in the initialization routines that are executed during bootup of Cisco IOS XE Software for Cisco ASR 900 Series Aggregation Services Routers with a Route Switch Processor 3 (RSP3) installed could allow an authenticated, local attacker with high privileges to execute persistent code at bootup and break the chain of trust. These vulnerabilities are due to incorrect validations by boot scripts when specific ROM monitor (ROMMON) variables are set. An attacker could exploit these vulnerabilities by copying a specific file to the local file system of an affected device and defining specific ROMMON variables. A successful exploit could allow the attacker to run arbitrary code on the underlying operating system (OS) with root privileges. To exploit these vulnerabilities, an attacker would need to have access to the root shell on the device or have physical access to the device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeasr_903asr_902asr_907Cisco IOS XE Software
CWE ID-CWE-749
Exposed Dangerous Method or Function
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2011-1265
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-0.33% / 55.14%
||
7 Day CHG~0.00%
Published-13 Jul, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Bluetooth Stack 2.1 in Microsoft Windows Vista SP1 and SP2 and Windows 7 Gold and SP1 does not prevent access to objects in memory that (1) were not properly initialized or (2) have been deleted, which allows remote attackers to execute arbitrary code via crafted Bluetooth packets, aka "Bluetooth Stack Vulnerability."

Action-Not Available
Vendor-bluetoothn/aMicrosoft Corporation
Product-windows_7bluetooth_stackwindows_vistan/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
  • Previous
  • 1
  • 2
  • Next
Details not found