CVE-2005-3921
Gravedad CVSS v2.0:
BAJA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
30/11/2005
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Cross-site scripting (XSS) vulnerability in Cisco IOS Web Server for IOS 12.0(2a) allows remote attackers to inject arbitrary web script or HTML by (1) packets containing HTML that an administrator views via an HTTP interface to the contents of memory buffers, as demonstrated by the URI /level/15/exec/-/buffers/assigned/dump; or (2) sending the router Cisco Discovery Protocol (CDP) packets with HTML payload that an administrator views via the CDP status pages. NOTE: these vectors were originally reported as being associated with the dump and packet options in /level/15/exec/-/show/buffers.
Impacto
Puntuación base 2.0
2.60
Gravedad 2.0
BAJA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* | 12.3 (incluyendo) | |
| cpe:2.3:o:cisco:ios:12.3\(1a\):*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)ja:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)ja5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)jk:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)jk1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)t3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)t8:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)xa4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)xa5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)xc1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)xc2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)xc3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)xc4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)xe3:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://secunia.com/advisories/17780
- http://secunia.com/advisories/18528
- http://securityreason.com/securityalert/227
- http://securitytracker.com/id?1015275=
- http://www.cisco.com/warp/public/707/cisco-sa-20051201-http.shtml
- http://www.idefense.com/intelligence/vulnerabilities/display.php?id=372
- http://www.infohacking.com/INFOHACKING_RESEARCH/Our_Advisories/cisco/index.html
- http://www.securityfocus.com/archive/1/417916/100/0/threaded
- http://www.securityfocus.com/bid/15602
- http://www.securityfocus.com/bid/16291
- http://www.vupen.com/english/advisories/2005/2657
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5867
- http://secunia.com/advisories/17780
- http://secunia.com/advisories/18528
- http://securityreason.com/securityalert/227
- http://securitytracker.com/id?1015275=
- http://www.cisco.com/warp/public/707/cisco-sa-20051201-http.shtml
- http://www.idefense.com/intelligence/vulnerabilities/display.php?id=372
- http://www.infohacking.com/INFOHACKING_RESEARCH/Our_Advisories/cisco/index.html
- http://www.securityfocus.com/archive/1/417916/100/0/threaded
- http://www.securityfocus.com/bid/15602
- http://www.securityfocus.com/bid/16291
- http://www.vupen.com/english/advisories/2005/2657
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5867



