9.3
CVE-2013-1192
- EPSS 0.82%
- Veröffentlicht 25.04.2013 10:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
The JAR files on Cisco Device Manager for Cisco MDS 9000 devices before 5.2.8, and Cisco Device Manager for Cisco Nexus 5000 devices, allow remote attackers to execute arbitrary commands on Windows client machines via a crafted element-manager.jnlp file, aka Bug IDs CSCty17417 and CSCty10802.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Adaptive Security Appliance Device Manager Version <= 5.2.5
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.1
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.2
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.4
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.5
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.6
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.7
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.8
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.9
Cisco ≫ Adaptive Security Appliance Device Manager Version5.1.1
Cisco ≫ Adaptive Security Appliance Device Manager Version5.1.2
Cisco ≫ Adaptive Security Appliance Device Manager Version5.2.1
Cisco ≫ Adaptive Security Appliance Device Manager Version5.2.2
Cisco ≫ Adaptive Security Appliance Device Manager Version5.2.3
Cisco ≫ Adaptive Security Appliance Device Manager Version5.2.4
Cisco ≫ Nexus 5000 Version-
Cisco ≫ Nexus 5010 Version-
Cisco ≫ Nexus 5010p Switch Version-
Cisco ≫ Nexus 5020 Version-
Cisco ≫ Nexus 5020p Switch Version-
Cisco ≫ Nexus 5548p Version-
Cisco ≫ Nexus 5548up Version-
Cisco ≫ Nexus 5596up Version-
Cisco ≫ Adaptive Security Appliance Device Manager Version <= 5.2.5
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.1
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.2
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.4
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.5
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.6
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.7
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.8
Cisco ≫ Adaptive Security Appliance Device Manager Version5.0.9
Cisco ≫ Adaptive Security Appliance Device Manager Version5.1.1
Cisco ≫ Adaptive Security Appliance Device Manager Version5.1.2
Cisco ≫ Adaptive Security Appliance Device Manager Version5.2.1
Cisco ≫ Adaptive Security Appliance Device Manager Version5.2.2
Cisco ≫ Adaptive Security Appliance Device Manager Version5.2.3
Cisco ≫ Adaptive Security Appliance Device Manager Version5.2.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.82% | 0.721 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.