Vulnerabilities > Cisco > Enterprise Content Delivery Network Software
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2013-08-01 | CVE-2013-3444 | OS Command Injection vulnerability in Cisco products The web framework in Cisco WAAS Software before 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1; Cisco ACNS Software 4.x and 5.x before 5.5.29.2; Cisco ECDS Software 2.x before 2.5.6; Cisco CDS-IS Software 2.x before 2.6.3.b50 and 3.1.x before 3.1.2b54; Cisco VDS-IS Software 3.2.x before 3.2.1.b9; Cisco VDS-SB Software 1.x before 1.1.0-b96; Cisco VDS-OE Software 1.x before 1.0.1; and Cisco VDS-OS Software 1.x in central-management mode allows remote authenticated users to execute arbitrary commands by appending crafted strings to values in GUI fields, aka Bug IDs CSCug40609, CSCug48855, CSCug48921, CSCug48872, CSCuh21103, CSCuh21020, and CSCug56790. | 9.0 |
2005-02-24 | CVE-2005-0600 | Remote vulnerability in Cisco Application and Content Networking System Cisco devices running Application and Content Networking System (ACNS) 5.0, 5.1 before 5.1.13.7, or 5.2 before 5.2.3.9 allow remote attackers to cause a denial of service (bandwidth consumption) via "crafted IP packets" that are continuously forwarded. | 5.0 |
2005-02-24 | CVE-2005-0598 | Remote vulnerability in Cisco Application and Content Networking System The RealServer RealSubscriber on Cisco devices running Application and Content Networking System (ACNS) 5.1 allow remote attackers to cause a denial of service (CPU consumption) via malformed packets. | 5.0 |
2004-01-05 | CVE-2003-0982 | Remote Buffer Overrun vulnerability in Cisco ACNS Authentication Library Buffer overflow in the authentication module for Cisco ACNS 4.x before 4.2.11, and 5.x before 5.0.5, allows remote attackers to execute arbitrary code via a long password. | 7.5 |
2002-08-12 | CVE-2002-0778 | Unspecified vulnerability in Cisco products The default configuration of the proxy for Cisco Cache Engine and Content Engine allows remote attackers to use HTTPS to make TCP connections to allowed IP addresses while hiding the actual source IP. | 7.5 |