漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A Directory Traversal vulnerability in the web framework code of the Cisco application-hosting framework (CAF) component of the Cisco IOx application environment could allow an unauthenticated, remote attacker to read any file from the CAF in the virtual instance running on the affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting crafted requests to the CAF web interface. The impacts of a successful exploit are limited to the scope of the virtual instance and do not impact the router that is hosting Cisco IOx. Cisco IOx Releases 1.0.0.0 and 1.1.0.0 are vulnerable. Cisco Bug IDs: CSCuy52302.
漏洞信息
N/A
漏洞
对路径名的限制不恰当(路径遍历)
漏洞
Cisco IOx Cisco Application-hosting Framework 路径遍历漏洞
漏洞信息
Cisco IOx是美国思科(Cisco)公司的一套为思科物联网网络基础设施(Cisco路由器、交换机等)提供统一托管功能的应用程序。Cisco Application-hosting Framework(CAF)是其中的一个应用程序托管框架组件。 Cisco IOx 1.0.0.0和1.1.0.0版本的CAF组件中的Web框架代码存在目录遍历漏洞,该漏洞源于程序没有充分过滤输入数据。远程攻击者可利用该漏洞读取任意文件。
漏洞信息
N/A
漏洞
N/A