9.3

CVE-2015-0691

A certain Cisco JAR file, as distributed in Cache Cleaner in Cisco Secure Desktop (CSD), allows remote attackers to execute arbitrary commands via a crafted web site, aka Bug ID CSCup83001.

Data is provided by the National Vulnerability Database (NVD)
CiscoSecure Desktop Version3.0_base
CiscoSecure Desktop Version3.1.0.31
CiscoSecure Desktop Version3.1.1
CiscoSecure Desktop Version3.1.1.45
CiscoSecure Desktop Version3.1_base
CiscoSecure Desktop Version3.2.0.136
CiscoSecure Desktop Version3.2.1.103
CiscoSecure Desktop Version3.2.1.126
CiscoSecure Desktop Version3.2_base
CiscoSecure Desktop Version3.3.0.118
CiscoSecure Desktop Version3.3.0.151
CiscoSecure Desktop Version3.3_base
CiscoSecure Desktop Version3.4.0373
CiscoSecure Desktop Version3.4.1108
CiscoSecure Desktop Version3.4.2048
CiscoSecure Desktop Version3.4_base
CiscoSecure Desktop Version3.5.841
CiscoSecure Desktop Version3.5.1077
CiscoSecure Desktop Version3.5.2001
CiscoSecure Desktop Version3.5.2003
CiscoSecure Desktop Version3.5.2008
CiscoSecure Desktop Version3.5_base
CiscoSecure Desktop Version3.6.181
CiscoSecure Desktop Version3.6.185
CiscoSecure Desktop Version3.6.1001
CiscoSecure Desktop Version3.6.2002
CiscoSecure Desktop Version3.6.3002
CiscoSecure Desktop Version3.6.4021
CiscoSecure Desktop Version3.6.5005
CiscoSecure Desktop Version3.6.6020
CiscoSecure Desktop Version3.6.6104
CiscoSecure Desktop Version3.6.6203
CiscoSecure Desktop Version3.6.6210
CiscoSecure Desktop Version3.6.6228
CiscoSecure Desktop Version3.6.6234
CiscoSecure Desktop Version3.6.6249
CiscoSecure Desktop Version3.6_base
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.71% 0.712
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.