Vulnerabilites related to cisco - acs_solution_engine
cve-2008-0533
Vulnerability from cvelistv5
Published
2008-03-14 20:00
Modified
2024-08-07 07:46
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to inject arbitrary web script or HTML via an argument located immediately after the Help argument, and possibly unspecified other vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt | x_refsource_MISC | |
http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/archive/1/489463/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/28222 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2008/0868 | vdb-entry, x_refsource_VUPEN | |
http://securityreason.com/securityalert/3743 | third-party-advisory, x_refsource_SREASON | |
http://securitytracker.com/id?1019607 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41156 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/29351 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:46:54.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt" }, { "name": "20080312 Cisco Secure Access Control Server for Windows User-Changeable Password Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml" }, { "name": "20080312 Cisco ACS UCP Remote Pre-Authentication Buffer Overflows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489463/100/0/threaded" }, { "name": "28222", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28222" }, { "name": "ADV-2008-0868", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0868" }, { "name": "3743", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3743" }, { "name": "1019607", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1019607" }, { "name": "cisco-acs-ucp-csusercgi-xss(41156)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41156" }, { "name": "29351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29351" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to inject arbitrary web script or HTML via an argument located immediately after the Help argument, and possibly unspecified other vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt" }, { "name": "20080312 Cisco Secure Access Control Server for Windows User-Changeable Password Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml" }, { "name": "20080312 Cisco ACS UCP Remote Pre-Authentication Buffer Overflows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489463/100/0/threaded" }, { "name": "28222", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28222" }, { "name": "ADV-2008-0868", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0868" }, { "name": "3743", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3743" }, { "name": "1019607", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1019607" }, { "name": "cisco-acs-ucp-csusercgi-xss(41156)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41156" }, { "name": "29351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29351" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2008-0533", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to inject arbitrary web script or HTML via an argument located immediately after the Help argument, and possibly unspecified other vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt", "refsource": "MISC", "url": "http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt" }, { "name": "20080312 Cisco Secure Access Control Server for Windows User-Changeable Password Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml" }, { "name": "20080312 Cisco ACS UCP Remote Pre-Authentication Buffer Overflows", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489463/100/0/threaded" }, { "name": "28222", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28222" }, { "name": "ADV-2008-0868", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0868" }, { "name": "3743", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3743" }, { "name": "1019607", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1019607" }, { "name": "cisco-acs-ucp-csusercgi-xss(41156)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41156" }, { "name": "29351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29351" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2008-0533", "datePublished": "2008-03-14T20:00:00", "dateReserved": "2008-01-31T00:00:00", "dateUpdated": "2024-08-07T07:46:54.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1467
Vulnerability from cvelistv5
Published
2007-03-16 21:00
Modified
2024-08-07 12:59
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace Express, CallManager, IP Communicator, Unified Video Advantage, Unified Videoconferencing 35xx products, Unified Videoconferencing Manager, WAN Manager, Security Device Manager, Network Analysis Module (NAM), CiscoWorks and related products, Wireless LAN Solution Engine (WLSE), 2006 Wireless LAN Controllers (WLC), and Wireless Control System (WCS) allow remote attackers to inject arbitrary web script or HTML via the text field of the search form.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/462932/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.cisco.com/en/US/products/products_security_response09186a0080803fe4.html | vendor-advisory, x_refsource_CISCO | |
http://securityreason.com/securityalert/2437 | third-party-advisory, x_refsource_SREASON | |
http://secunia.com/advisories/24499 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33024 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1017778 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/462944/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/22982 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2007/0973 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:59:08.398Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20070315 XSS vulnerability in the online help system of several Cisco products", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/462932/100/0/threaded" }, { "name": "20070315 Cross-Site Scripting Vulnerability in Online Help System", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_response09186a0080803fe4.html" }, { "name": "2437", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2437" }, { "name": "24499", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24499" }, { "name": "cisco-presearch-xss(33024)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33024" }, { "name": "1017778", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017778" }, { "name": "20070315 Re: XSS vulnerability in the online help system of several Cisco products", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/462944/100/0/threaded" }, { "name": "22982", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22982" }, { "name": "ADV-2007-0973", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0973" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace Express, CallManager, IP Communicator, Unified Video Advantage, Unified Videoconferencing 35xx products, Unified Videoconferencing Manager, WAN Manager, Security Device Manager, Network Analysis Module (NAM), CiscoWorks and related products, Wireless LAN Solution Engine (WLSE), 2006 Wireless LAN Controllers (WLC), and Wireless Control System (WCS) allow remote attackers to inject arbitrary web script or HTML via the text field of the search form." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20070315 XSS vulnerability in the online help system of several Cisco products", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/462932/100/0/threaded" }, { "name": "20070315 Cross-Site Scripting Vulnerability in Online Help System", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_response09186a0080803fe4.html" }, { "name": "2437", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2437" }, { "name": "24499", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24499" }, { "name": "cisco-presearch-xss(33024)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33024" }, { "name": "1017778", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017778" }, { "name": "20070315 Re: XSS vulnerability in the online help system of several Cisco products", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/462944/100/0/threaded" }, { "name": "22982", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22982" }, { "name": "ADV-2007-0973", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0973" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1467", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace Express, CallManager, IP Communicator, Unified Video Advantage, Unified Videoconferencing 35xx products, Unified Videoconferencing Manager, WAN Manager, Security Device Manager, Network Analysis Module (NAM), CiscoWorks and related products, Wireless LAN Solution Engine (WLSE), 2006 Wireless LAN Controllers (WLC), and Wireless Control System (WCS) allow remote attackers to inject arbitrary web script or HTML via the text field of the search form." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20070315 XSS vulnerability in the online help system of several Cisco products", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/462932/100/0/threaded" }, { "name": "20070315 Cross-Site Scripting Vulnerability in Online Help System", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_response09186a0080803fe4.html" }, { "name": "2437", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2437" }, { "name": "24499", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24499" }, { "name": "cisco-presearch-xss(33024)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33024" }, { "name": "1017778", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017778" }, { "name": "20070315 Re: XSS vulnerability in the online help system of several Cisco products", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/462944/100/0/threaded" }, { "name": "22982", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22982" }, { "name": "ADV-2007-0973", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0973" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1467", "datePublished": "2007-03-16T21:00:00", "dateReserved": "2007-03-16T00:00:00", "dateUpdated": "2024-08-07T12:59:08.398Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0532
Vulnerability from cvelistv5
Published
2008-03-14 20:00
Modified
2024-08-07 07:46
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to execute arbitrary code via a long argument located immediately after the Logout argument, and possibly unspecified other vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt | x_refsource_MISC | |
http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/archive/1/489463/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/28222 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2008/0868 | vdb-entry, x_refsource_VUPEN | |
http://securityreason.com/securityalert/3743 | third-party-advisory, x_refsource_SREASON | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41154 | vdb-entry, x_refsource_XF | |
http://securitytracker.com/id?1019608 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/29351 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:46:55.104Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt" }, { "name": "20080312 Cisco Secure Access Control Server for Windows User-Changeable Password Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml" }, { "name": "20080312 Cisco ACS UCP Remote Pre-Authentication Buffer Overflows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489463/100/0/threaded" }, { "name": "28222", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28222" }, { "name": "ADV-2008-0868", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0868" }, { "name": "3743", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3743" }, { "name": "cisco-acs-ucp-csusercgi-bo(41154)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41154" }, { "name": "1019608", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1019608" }, { "name": "29351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29351" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to execute arbitrary code via a long argument located immediately after the Logout argument, and possibly unspecified other vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt" }, { "name": "20080312 Cisco Secure Access Control Server for Windows User-Changeable Password Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml" }, { "name": "20080312 Cisco ACS UCP Remote Pre-Authentication Buffer Overflows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489463/100/0/threaded" }, { "name": "28222", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28222" }, { "name": "ADV-2008-0868", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0868" }, { "name": "3743", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3743" }, { "name": "cisco-acs-ucp-csusercgi-bo(41154)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41154" }, { "name": "1019608", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1019608" }, { "name": "29351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29351" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2008-0532", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to execute arbitrary code via a long argument located immediately after the Logout argument, and possibly unspecified other vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt", "refsource": "MISC", "url": "http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt" }, { "name": "20080312 Cisco Secure Access Control Server for Windows User-Changeable Password Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml" }, { "name": "20080312 Cisco ACS UCP Remote Pre-Authentication Buffer Overflows", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489463/100/0/threaded" }, { "name": "28222", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28222" }, { "name": "ADV-2008-0868", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0868" }, { "name": "3743", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3743" }, { "name": "cisco-acs-ucp-csusercgi-bo(41154)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41154" }, { "name": "1019608", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1019608" }, { "name": "29351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29351" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2008-0532", "datePublished": "2008-03-14T20:00:00", "dateReserved": "2008-01-31T00:00:00", "dateUpdated": "2024-08-07T07:46:55.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2008-03-14 20:44
Modified
2024-11-21 00:42
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to inject arbitrary web script or HTML via an argument located immediately after the Help argument, and possibly unspecified other vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | acs_for_windows | * | |
cisco | acs_solution_engine | * | |
cisco | user_changeable_password | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:acs_for_windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "874EB4DE-9C14-4D6A-B67B-0AC2C4D2FF2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:acs_solution_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "706A8388-3141-4B5A-A54D-47BDD87A0A62", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:user_changeable_password:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "D561CBFD-7CC3-435E-8D42-658637BB9F50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to inject arbitrary web script or HTML via an argument located immediately after the Help argument, and possibly unspecified other vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) del m\u00f3dulo securecgi-bin/CSuserCGI.exe en vesiones anteriores a la 4.2 de Cisco Secure Access Control Server (ACS) para Windows y ACS Solution Engine, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante la utilizaci\u00f3n de un argumento situado a continuaci\u00f3n del argumento Help y probablemente mediante otros vectores no especificados." } ], "id": "CVE-2008-0533", "lastModified": "2024-11-21T00:42:19.523", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-03-14T20:44:00.000", "references": [ { "source": "psirt@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/29351" }, { "source": "psirt@cisco.com", "url": "http://securityreason.com/securityalert/3743" }, { "source": "psirt@cisco.com", "url": "http://securitytracker.com/id?1019607" }, { "source": "psirt@cisco.com", "tags": [ "Patch" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml" }, { "source": "psirt@cisco.com", "url": "http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt" }, { "source": "psirt@cisco.com", "url": "http://www.securityfocus.com/archive/1/489463/100/0/threaded" }, { "source": "psirt@cisco.com", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28222" }, { "source": "psirt@cisco.com", "url": "http://www.vupen.com/english/advisories/2008/0868" }, { "source": "psirt@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41156" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/29351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1019607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/489463/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41156" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-16 21:19
Modified
2024-11-21 00:28
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace Express, CallManager, IP Communicator, Unified Video Advantage, Unified Videoconferencing 35xx products, Unified Videoconferencing Manager, WAN Manager, Security Device Manager, Network Analysis Module (NAM), CiscoWorks and related products, Wireless LAN Solution Engine (WLSE), 2006 Wireless LAN Controllers (WLC), and Wireless Control System (WCS) allow remote attackers to inject arbitrary web script or HTML via the text field of the search form.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:acs_solution_engine:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "2053FEE9-7DE5-4C5E-B2C1-5652301DBFFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:acs_solution_engine:4.1:*:windows:*:*:*:*:*", "matchCriteriaId": "3436B987-134F-47FD-94A9-B22E1D6E1F7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:ciscoworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "A687E771-9653-4FB6-888C-C6D7874E8F11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:ip_communicator:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E2590B4-F61E-4ED9-B4B2-45227CDF8E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:meetingplace:*:*:*:*:*:*:*:*", "matchCriteriaId": "41EEA208-7F2E-4E01-8C8C-29009161E6EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:security_device_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E7C476-E8CE-4CD4-9ED2-926B4BA6EDF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_meetingplace:*:*:*:*:*:*:*:*", "matchCriteriaId": "713CDBB9-F841-455A-B173-7B239DF087D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_meetingplace_express:*:*:*:*:*:*:*:*", "matchCriteriaId": "8932A12B-BDAD-4078-92C3-720CE4E204CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_personal_communicator:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AC0A911-917D-426B-84D3-05BEAEE9C81F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_video_advantage:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1BDD7B4-CD06-44D9-855B-30FFE673014E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_videoconferencing:*:*:*:*:*:*:*:*", "matchCriteriaId": "B50D62D1-83D3-4347-A979-503294EC4B9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_videoconferencing_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "19065178-BD77-4ED5-AE31-9904E348B2C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.5.1:*:linux:*:*:*:*:*", "matchCriteriaId": "2BD00D0A-EB6E-41AA-851D-9DD258E23BEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.5.1:*:solaris:*:*:*:*:*", "matchCriteriaId": "88EB557F-33CD-40FE-B470-04F93CB2F3E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.5.2:*:linux:*:*:*:*:*", "matchCriteriaId": "F2EEB23E-4592-49A1-BDC6-110580340AAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.5.2:*:mac_os_x:*:*:*:*:*", "matchCriteriaId": "D548CEFE-1970-42D3-9039-196A3B5F5D0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.5.2:*:solaris:*:*:*:*:*", "matchCriteriaId": "2D4BDB9B-99D8-42B7-8D57-2B57029220F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.5.2b:*:linux:*:*:*:*:*", "matchCriteriaId": "B2F5C5E1-59A5-4402-BF6A-DDD05F8F07F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.5.2b:*:mac_os_x:*:*:*:*:*", "matchCriteriaId": "269EE54C-B6C7-4F3E-B4ED-12CF9F277569", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.5.2b:*:solaris:*:*:*:*:*", "matchCriteriaId": "12A573DB-1D58-4A78-85C6-B2A3B09F34B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.5.4:*:linux:*:*:*:*:*", "matchCriteriaId": "DEB505B7-54A0-4A53-81FC-9E6635A50BB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.5.4:*:mac_os_x:*:*:*:*:*", "matchCriteriaId": "1728BA7D-0124-4E7B-9D0A-549DB87F3732", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.5.4:*:solaris:*:*:*:*:*", "matchCriteriaId": "DD1D17D3-F56E-47FC-90F9-54AC4446CB11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.6:*:linux:*:*:*:*:*", "matchCriteriaId": "9A9F7CE9-771E-4F0C-B4DD-B9517F70BBCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.6:*:mac_os_x:*:*:*:*:*", "matchCriteriaId": "0C7B2037-406B-4A18-9B5D-D3F206C58AE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.6:*:solaris:*:*:*:*:*", "matchCriteriaId": "08A9E927-1092-4F6A-A099-DB80EA060F54", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.6.1:*:linux:*:*:*:*:*", "matchCriteriaId": "872A3F31-1008-416A-9881-803E7DF11B1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.6.1:*:mac_os_x:*:*:*:*:*", "matchCriteriaId": "50FB297D-5289-46D1-82C2-E83C3020895C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:3.6.1:*:solaris:*:*:*:*:*", "matchCriteriaId": "D88E0D0C-03EF-4528-93C9-97B39342CA82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:4.0.2a:*:mac_os_x:*:*:*:*:*", "matchCriteriaId": "4C111372-50F2-4F3E-8DFE-1EB5509B489C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:4.0.2a:*:solaris:*:*:*:*:*", "matchCriteriaId": "B19317CB-C159-4BEF-B8F8-A919E8DF6783", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:4.0.2c:*:mac_os_x:*:*:*:*:*", "matchCriteriaId": "B7C7C00F-72E3-41E1-A763-0209AF639053", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:4.0.2c:*:solaris:*:*:*:*:*", "matchCriteriaId": "B205CD80-4469-4DA9-B0E1-73C2B83E33D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vpn_client:4.8.1:*:windows:*:*:*:*:*", "matchCriteriaId": "8FD6C3C5-A7D3-4208-A23C-BA7D5626FB92", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:wan_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEFD455A-7E41-4C95-A1E9-1A4867DA4F4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:wireless_lan_controllers:*:*:*:*:*:*:*:*", "matchCriteriaId": "C88AB3CC-4F0E-4A82-B4F0-13EDA4948BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:wireless_lan_solution_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FDEE04C-0231-42F7-9736-EB3B7A020E50", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "12DE5E22-DF93-46BE-85A3-D4E04379E901", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:network_analysis_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD82BCCE-F68A-48A5-B484-98D9C3024E3A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:wireless_control_system:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFF3680D-50CB-4854-84B8-34129DDB2A2A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace Express, CallManager, IP Communicator, Unified Video Advantage, Unified Videoconferencing 35xx products, Unified Videoconferencing Manager, WAN Manager, Security Device Manager, Network Analysis Module (NAM), CiscoWorks and related products, Wireless LAN Solution Engine (WLSE), 2006 Wireless LAN Controllers (WLC), and Wireless Control System (WCS) allow remote attackers to inject arbitrary web script or HTML via the text field of the search form." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en (1) PreSearch.html y (2) PreSearch.class en Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace Express, CallManager, IP Communicator, Unified Video Advantage, Unified Videoconferencing 35xx products, Unified Videoconferencing Manager, WAN Manager, Security Device Manager, Network Analysis Module (NAM), CiscoWorks y productos relacionados, Wireless LAN Solution Engine (WLSE), 2006 Wireless LAN Controllers (WLC), y Wireless Control System (WCS) permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de campos de texto de un formulario de b\u00fasqueda." } ], "id": "CVE-2007-1467", "lastModified": "2024-11-21T00:28:22.977", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-03-16T21:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/24499" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2437" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_response09186a0080803fe4.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/462932/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/462944/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/22982" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1017778" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0973" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24499" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2437" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_response09186a0080803fe4.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/462932/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/462944/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/22982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1017778" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33024" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-14 20:44
Modified
2024-11-21 00:42
Severity ?
Summary
Multiple buffer overflows in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to execute arbitrary code via a long argument located immediately after the Logout argument, and possibly unspecified other vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | acs_for_windows | * | |
cisco | acs_solution_engine | * | |
cisco | user_changeable_password | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:acs_for_windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "874EB4DE-9C14-4D6A-B67B-0AC2C4D2FF2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:acs_solution_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "706A8388-3141-4B5A-A54D-47BDD87A0A62", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:user_changeable_password:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "D561CBFD-7CC3-435E-8D42-658637BB9F50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to execute arbitrary code via a long argument located immediately after the Logout argument, and possibly unspecified other vectors." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de buffer en el m\u00f3dulo securecgi-bin/CSuserCGI.exe de User-Changeable Password (UCP) en versiones anteriores a la 4.2 de Cisco Secure Access Control Server (ACS)para Windows y ACS Solution Engine, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n, mediante la utilizaci\u00f3n de argumentos largos localizados a continuaci\u00f3n del argumento Logout y posiblemente a trav\u00e9s de otros vectores no especificados." } ], "id": "CVE-2008-0532", "lastModified": "2024-11-21T00:42:19.410", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-14T20:44:00.000", "references": [ { "source": "psirt@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/29351" }, { "source": "psirt@cisco.com", "url": "http://securityreason.com/securityalert/3743" }, { "source": "psirt@cisco.com", "url": "http://securitytracker.com/id?1019608" }, { "source": "psirt@cisco.com", "tags": [ "Patch" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml" }, { "source": "psirt@cisco.com", "url": "http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt" }, { "source": "psirt@cisco.com", "url": "http://www.securityfocus.com/archive/1/489463/100/0/threaded" }, { "source": "psirt@cisco.com", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/28222" }, { "source": "psirt@cisco.com", "url": "http://www.vupen.com/english/advisories/2008/0868" }, { "source": "psirt@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/29351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1019608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/489463/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/28222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41154" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }