Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2016-6412
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Cisco Application-hosting Framework (CAF) component in Cisco IOS 15.6(1)T1 and IOS XE, when the IOx feature set is enabled, allows man-in-the-middle attackers to trigger arbitrary downloads via crafted HTTP headers, aka Bug ID CSCuz84773.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco IOS和IOS XE HTTP头注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco IOS和IOS XE Software都是美国思科(Cisco)公司为其网络设备开发的操作系统。Cisco Application-hosting Framework(CAF)是其中的一个应用程序托管框架组件。 Cisco IOS 15.6(1)T1版本和IOS XE Software中的CAF组件中存在HTTP头注入漏洞。当启用Iox功能设置时,攻击者可通过在会话路径中注入HTTP头利用该漏洞实施中间人攻击,造成用户下载攻击者控制的文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2016-6412
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2016-6412
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2016-6412

No comments yet


Leave a comment