Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-5561

EPSS 0.18% · P40
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2013-5561

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Safe Search enforcement feature in Cisco Adaptive Security Appliance (ASA) CX Context-Aware Security Software does not properly perform filtering, which allows remote attackers to bypass intended policy restrictions via unspecified vectors, aka Bug ID CSCui94622.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco ASA CX Remote Safe Search Policy 安全绕过漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Adaptive Security Appliance(ASA) CX Context-Aware Security Software是美国思科(Cisco)公司的一款用于扩展ASA平台的附加服务模块。 Cisco ASA CX Context-Aware Security Software中的Safe Search强制执行组件中存在安全漏洞,该漏洞源于程序没有正确执行过滤操作。远程攻击者可利用该漏洞绕过既定的策略限制。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2013-5561

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2013-5561

登录查看更多情报信息。

Same Patch Batch · n/a · 2013-11-04 · 20 CVEs total

CVE-2013-6337Wireshark NBAP解析器拒绝服务漏洞
CVE-2013-6114Apple Motion ‘OZDocument::parseElement()’远程整数溢出漏洞
CVE-2013-4483Linux Kernel ‘ipc_rcu_putref()’函数拒绝服务漏洞
CVE-2013-4470Linux kernel 权限许可和访问控制问题漏洞
CVE-2013-4348Linux kernel 资源管理错误漏洞
CVE-2013-2058Linux Kernel ‘host.c’ 多个拒绝服务漏洞
CVE-2013-6366VMware Hyperic HQ Groovy脚本控制台任意代码执行漏洞
CVE-2013-6340Wireshark TCP解析器拒绝服务漏洞
CVE-2013-6339Wireshark OpenWire解析器‘dissect_openwire_type’函数拒绝服务漏洞
CVE-2013-6338Wireshark SIP解析器‘dissect_sip_common’函数拒绝服务漏洞
CVE-2013-4834HP ALM client组件远程代码执行漏洞
CVE-2013-6336Wireshark IEEE 802.15.4解析器‘ieee802154_map_rec’函数拒绝服务漏洞
CVE-2013-5564Cisco Prime Central for HCS Java进程拒绝服务漏洞
CVE-2013-5559Cisco AnyConnect Secure Mobility Client 缓冲区溢出漏洞
CVE-2013-4839HP LoadRunner Virtual User Generator 安全漏洞
CVE-2013-4838HP LoadRunner Virtual User Generator 远程代码执行漏洞
CVE-2013-4837HP LoadRunner Virtual User Generator 远程代码执行漏洞
CVE-2013-4836HP ALM Synchronizer组件远程代码执行漏洞
CVE-2013-4835HP SiteScope issueSiebelCmd SOAP功能远程代码执行漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2013-5561

No comments yet


Leave a comment