5.9
CVE-2016-6461
- EPSS 0.34%
- Veröffentlicht 19.11.2016 03:03:04
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
A vulnerability in the HTTP web-based management interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to inject arbitrary XML commands on the affected system. More Information: CSCva38556. Known Affected Releases: 9.1(6.10). Known Fixed Releases: 100.11(0.75) 100.15(0.137) 100.8(40.129) 96.2(0.95) 97.1(0.55) 97.1(12.7) 97.1(6.30).
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Adaptive Security Appliance Software Version9.1.6.10
Cisco ≫ Adaptive Security Appliance Software Version9.2.1
Cisco ≫ Adaptive Security Appliance Software Version9.2.2
Cisco ≫ Adaptive Security Appliance Software Version9.2.2.4
Cisco ≫ Adaptive Security Appliance Software Version9.2.2.7
Cisco ≫ Adaptive Security Appliance Software Version9.2.2.8
Cisco ≫ Adaptive Security Appliance Software Version9.2.3
Cisco ≫ Adaptive Security Appliance Software Version9.2.3.3
Cisco ≫ Adaptive Security Appliance Software Version9.2.3.4
Cisco ≫ Adaptive Security Appliance Software Version9.2.4
Cisco ≫ Adaptive Security Appliance Software Version9.2.4.4
Cisco ≫ Adaptive Security Appliance Software Version9.2.4.8
Cisco ≫ Adaptive Security Appliance Software Version9.2.4.10
Cisco ≫ Adaptive Security Appliance Software Version9.2.4.13
Cisco ≫ Adaptive Security Appliance Software Version9.2.4.14
Cisco ≫ Adaptive Security Appliance Software Version9.2.4.16
Cisco ≫ Adaptive Security Appliance Software Version9.2.4.17
Cisco ≫ Adaptive Security Appliance Software Version9.3.1
Cisco ≫ Adaptive Security Appliance Software Version9.3.1.1
Cisco ≫ Adaptive Security Appliance Software Version9.3.2
Cisco ≫ Adaptive Security Appliance Software Version9.3.2.2
Cisco ≫ Adaptive Security Appliance Software Version9.3.3
Cisco ≫ Adaptive Security Appliance Software Version9.3.3.1
Cisco ≫ Adaptive Security Appliance Software Version9.3.3.2
Cisco ≫ Adaptive Security Appliance Software Version9.3.3.5
Cisco ≫ Adaptive Security Appliance Software Version9.3.3.6
Cisco ≫ Adaptive Security Appliance Software Version9.3.3.9
Cisco ≫ Adaptive Security Appliance Software Version9.3.3.10
Cisco ≫ Adaptive Security Appliance Software Version9.3.3.11
Cisco ≫ Adaptive Security Appliance Software Version9.3.5
Cisco ≫ Adaptive Security Appliance Software Version9.4.0.115
Cisco ≫ Adaptive Security Appliance Software Version9.4.1
Cisco ≫ Adaptive Security Appliance Software Version9.4.1.1
Cisco ≫ Adaptive Security Appliance Software Version9.4.1.2
Cisco ≫ Adaptive Security Appliance Software Version9.4.1.3
Cisco ≫ Adaptive Security Appliance Software Version9.4.1.5
Cisco ≫ Adaptive Security Appliance Software Version9.4.2
Cisco ≫ Adaptive Security Appliance Software Version9.4.2.3
Cisco ≫ Adaptive Security Appliance Software Version9.4.3
Cisco ≫ Adaptive Security Appliance Software Version9.4.3.3
Cisco ≫ Adaptive Security Appliance Software Version9.4.3.4
Cisco ≫ Adaptive Security Appliance Software Version9.4.3.6
Cisco ≫ Adaptive Security Appliance Software Version9.4.3.8
Cisco ≫ Adaptive Security Appliance Software Version9.4.3.11
Cisco ≫ Adaptive Security Appliance Software Version9.4.3.12
Cisco ≫ Adaptive Security Appliance Software Version9.4.4
Cisco ≫ Adaptive Security Appliance Software Version9.5.1
Cisco ≫ Adaptive Security Appliance Software Version9.5.2
Cisco ≫ Adaptive Security Appliance Software Version9.5.2.6
Cisco ≫ Adaptive Security Appliance Software Version9.5.2.10
Cisco ≫ Adaptive Security Appliance Software Version9.5.2.14
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.34% | 0.533 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.9 | 2.2 | 3.6 |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
|
| nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.