ologyasfen.blogg.se

Cisco cucm 8.6 data dictionary
Cisco cucm 8.6 data dictionary









cisco cucm 8.6 data dictionary
  1. #Cisco cucm 8.6 data dictionary software
  2. #Cisco cucm 8.6 data dictionary series

#Cisco cucm 8.6 data dictionary software

A successful exploit could allow the attacker to cause memory corruption or execute the code with root privileges on the underlying OS of the affected device.Ī vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker with privileged EXEC credentials to cause a denial of service (DoS) condition on an affected system.

cisco cucm 8.6 data dictionary

An attacker could exploit this vulnerability by loading malicious Tcl code on an affected device. The vulnerability is due to insufficient input validation of data passed to the Tcl interpreter. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or reload an affected device.Ī vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker with privileged EXEC credentials to execute arbitrary code on the underlying operating system (OS) with root privileges. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. The vulnerability is due to insufficient CSRF protections for the web UI on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing requests, resulting in a DoS condition.Ī vulnerability in the web UI of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the IOx web server on an affected device.

cisco cucm 8.6 data dictionary

This vulnerability is due to insufficient error handling during packet processing. A successful exploit could allow the attacker to cause the affected device to crash, resulting in a reload of the device.Ī vulnerability in the Cisco IOx Application Framework of Cisco 809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Module, and Cisco IC3000 Industrial Compute Gateway could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. An authenticated, adjacent attacker with SNMP read-only credentials or low privileges on the device CLI could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then accessing the LLDP neighbor table via either the CLI or SNMP. An unauthenticated, adjacent attacker could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then waiting for an administrator of the device or a network management system (NMS) managing the device to retrieve the LLDP neighbor table of the device via either the CLI or SNMP. An attacker could exploit this vulnerability via any of the following methods: An authenticated, remote attacker could access the LLDP neighbor table via either the CLI or SNMP while the device is in a specific state. This vulnerability is due to improper initialization of a buffer. For more information about these vulnerabilities, see the Details section of this advisory.Ī vulnerability in the Link Layer Discovery Protocol (LLDP) message parser of Cisco IOS Software and Cisco IOS XE Software could allow an attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition.

#Cisco cucm 8.6 data dictionary series

Multiple vulnerabilities that affect Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches could allow an attacker to execute persistent code at boot time or to permanently prevent the device from booting, resulting in a permanent denial of service (DoS) condition. If you want to see a complete summary for this CPE, please contact us.











Cisco cucm 8.6 data dictionary