Executive Summary

Informations
Name CVE-2013-3384 First vendor Publication 2013-06-27
Vendor Cve Last vendor Modification 2018-10-30

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C)
Cvss Base Score 9 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550; Email Security Appliance devices before 7.1.5-104, 7.3 before 7.3.2-026, 7.5 before 7.5.2-203, and 7.6 before 7.6.3-019; and Content Security Management Appliance devices before 7.2.2-110, 7.7 before 7.7.0-213, and 7.8 and 7.9 before 7.9.1-102 allows remote authenticated users to execute arbitrary commands via crafted command-line input in a URL, aka Bug IDs CSCzv85726, CSCzv44633, and CSCzv24579.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3384

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 21

Information Assurance Vulnerability Management (IAVM)

Date Description
2013-07-11 IAVM : 2013-A-0133 - Multiple Vulnerabilities in Cisco Products
Severity : Category I - VMSKEY : V0039204

Nessus® Vulnerability Scanner

Date Description
2013-07-26 Name : The remote security appliance is missing a vendor-supplied security patch.
File : cisco-sa-20130626-esa.nasl - Type : ACT_GATHER_INFO
2013-07-26 Name : The remote security appliance is missing a vendor-supplied patch.
File : cisco-sa-20130626-sma.nasl - Type : ACT_GATHER_INFO
2013-07-26 Name : The remote security appliance is missing a vendor-supplied patch.
File : cisco-sa-20130626-wsa.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CISCO http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa...
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa...
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa...

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2020-05-24 01:11:47
  • Multiple Updates
2020-05-23 00:37:40
  • Multiple Updates
2018-10-31 00:20:32
  • Multiple Updates
2016-11-03 12:06:44
  • Multiple Updates
2016-06-28 19:35:53
  • Multiple Updates
2016-04-26 23:25:56
  • Multiple Updates
2014-02-17 11:20:58
  • Multiple Updates
2013-11-11 12:40:34
  • Multiple Updates
2013-06-29 00:20:31
  • Multiple Updates
2013-06-28 13:18:50
  • First insertion