Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-0371

EPSS 0.33% · P56
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-0371

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the Web Admin Interface of Cisco Meeting Server could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of incoming HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the Web Admin Interface of an affected Cisco Meeting Server. A successful exploit could allow the attacker to restart the system, terminating all ongoing calls and resulting in a DoS condition on the affected product. This vulnerability affects the following releases of Cisco Meeting Server: Acano X-Series, Cisco Meeting Server 1000, Cisco Meeting Server 2000. Cisco Bug IDs: CSCvi48624.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Acano X-Series、Meeting Server 1000和Meeting Server 2000 Web Admin Interface 输入验证漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Acano X-Series、Meeting Server 1000和Meeting Server 2000都是美国思科(Cisco)公司的视频会议解决方案。Web Admin Interface是其中的一个基于Web的管理界面。 Cisco Acano X-Series、Meeting Server 1000和Meeting Server 2000中的Web Admin Interface存在输入验证漏洞,该漏洞源于程序没有充分验证HTTP请求。远程攻击者可通过向Web管理界面发送特制的HT
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Cisco Meeting Server unknown Cisco Meeting Server unknown -

II. Public POCs for CVE-2018-0371

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-0371

登录查看更多情报信息。

Same Patch Batch · n/a · 2018-06-21 · 30 CVEs total

CVE-2018-0305多款Cisco产品FXOS Software和NX-OS Software Fabric Services组件安全漏洞
CVE-2018-0373Cisco AnyConnect Secure Mobility Client for Windows Desktop 输入验证漏洞
CVE-2018-0365Cisco Firepower Management Center 跨站请求伪造漏洞
CVE-2018-0364Cisco Unified Communications Domain Manager 跨站请求伪造漏洞
CVE-2018-0363Cisco Unified Communications Manager IM & Presence Service 跨站请求伪造漏洞
CVE-2018-0362Cisco 5000 Series Enterprise Network Compute System和UCS E-Series Servers 授权问题漏洞
CVE-2018-0359Cisco Meeting Server 安全漏洞
CVE-2018-0358Cisco TelePresence Video Communication Server Expressway 安全漏洞
CVE-2018-0337Cisco NX-OS Software 输入验证错误漏洞
CVE-2018-0331多款Cisco产品NX-OS Software Discovery Protocol子系统资源管理错误漏洞
CVE-2018-0313多款Cisco产品NX-OS Software 输入验证漏洞
CVE-2018-0311多款Cisco产品FXOS Software和NX-OS Software Fabric Services组件资源管理错误漏洞
CVE-2018-0310多款Cisco产品FXOS Software和NX-OS Software Fabric Services组件资源管理错误漏洞
CVE-2018-0309Cisco Nexus 3000和9000 Series Switches NX-OS 安全漏洞
CVE-2018-0306多款Cisco产品NX-OS Software CLI解析器输入验证错误漏洞
CVE-2018-12630NEWMARK NMCMS SQL注入漏洞
CVE-2018-0303多款Cisco产品FXOS Software和NX-OS Software Discovery Protocol组件输入验证漏洞
CVE-2018-0302多款Cisco产品FXOS Software和UCS Fabric Interconnect Software CLI解析器输入验证错误漏洞
CVE-2018-0300Cisco Firepower 4100 Series Next-Generation Firewall和Firepower 9300 Security Appliance 路径遍
CVE-2018-0299Cisco Nexus 4000 Series Switch NX-OS 输入验证漏洞

Showing top 20 of 30 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2018-0371

No comments yet


Leave a comment