5.9
CVE-2016-6461
- EPSS 0.34%
- Veröffentlicht 19.11.2016 03:03:04
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in the HTTP web-based management interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to inject arbitrary XML commands on the affected system. More Information: CSCva38556. Known Affected Releases: 9.1(6.10). Known Fixed Releases: 100.11(0.75) 100.15(0.137) 100.8(40.129) 96.2(0.95) 97.1(0.55) 97.1(12.7) 97.1(6.30).
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Adaptive Security Appliance Software Version9.1.6.10
Cisco ≫ Adaptive Security Appliance Software Version9.2.1
Cisco ≫ Adaptive Security Appliance Software Version9.2.2
Cisco ≫ Adaptive Security Appliance Software Version9.2.2.4
Cisco ≫ Adaptive Security Appliance Software Version9.2.2.7
Cisco ≫ Adaptive Security Appliance Software Version9.2.2.8
Cisco ≫ Adaptive Security Appliance Software Version9.2.3
Cisco ≫ Adaptive Security Appliance Software Version9.2.3.3
Cisco ≫ Adaptive Security Appliance Software Version9.2.3.4
Cisco ≫ Adaptive Security Appliance Software Version9.2.4
Cisco ≫ Adaptive Security Appliance Software Version9.2.4.4
Cisco ≫ Adaptive Security Appliance Software Version9.2.4.8
Cisco ≫ Adaptive Security Appliance Software Version9.2.4.10
Cisco ≫ Adaptive Security Appliance Software Version9.2.4.13
Cisco ≫ Adaptive Security Appliance Software Version9.2.4.14
Cisco ≫ Adaptive Security Appliance Software Version9.2.4.16
Cisco ≫ Adaptive Security Appliance Software Version9.2.4.17
Cisco ≫ Adaptive Security Appliance Software Version9.3.1
Cisco ≫ Adaptive Security Appliance Software Version9.3.1.1
Cisco ≫ Adaptive Security Appliance Software Version9.3.2
Cisco ≫ Adaptive Security Appliance Software Version9.3.2.2
Cisco ≫ Adaptive Security Appliance Software Version9.3.3
Cisco ≫ Adaptive Security Appliance Software Version9.3.3.1
Cisco ≫ Adaptive Security Appliance Software Version9.3.3.2
Cisco ≫ Adaptive Security Appliance Software Version9.3.3.5
Cisco ≫ Adaptive Security Appliance Software Version9.3.3.6
Cisco ≫ Adaptive Security Appliance Software Version9.3.3.9
Cisco ≫ Adaptive Security Appliance Software Version9.3.3.10
Cisco ≫ Adaptive Security Appliance Software Version9.3.3.11
Cisco ≫ Adaptive Security Appliance Software Version9.3.5
Cisco ≫ Adaptive Security Appliance Software Version9.4.0.115
Cisco ≫ Adaptive Security Appliance Software Version9.4.1
Cisco ≫ Adaptive Security Appliance Software Version9.4.1.1
Cisco ≫ Adaptive Security Appliance Software Version9.4.1.2
Cisco ≫ Adaptive Security Appliance Software Version9.4.1.3
Cisco ≫ Adaptive Security Appliance Software Version9.4.1.5
Cisco ≫ Adaptive Security Appliance Software Version9.4.2
Cisco ≫ Adaptive Security Appliance Software Version9.4.2.3
Cisco ≫ Adaptive Security Appliance Software Version9.4.3
Cisco ≫ Adaptive Security Appliance Software Version9.4.3.3
Cisco ≫ Adaptive Security Appliance Software Version9.4.3.4
Cisco ≫ Adaptive Security Appliance Software Version9.4.3.6
Cisco ≫ Adaptive Security Appliance Software Version9.4.3.8
Cisco ≫ Adaptive Security Appliance Software Version9.4.3.11
Cisco ≫ Adaptive Security Appliance Software Version9.4.3.12
Cisco ≫ Adaptive Security Appliance Software Version9.4.4
Cisco ≫ Adaptive Security Appliance Software Version9.5.1
Cisco ≫ Adaptive Security Appliance Software Version9.5.2
Cisco ≫ Adaptive Security Appliance Software Version9.5.2.6
Cisco ≫ Adaptive Security Appliance Software Version9.5.2.10
Cisco ≫ Adaptive Security Appliance Software Version9.5.2.14
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.34% | 0.533 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 5.9 | 2.2 | 3.6 |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.