漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A vulnerability in the Web Server Authentication Required screen of the Clientless Secure Sockets Layer (SSL) VPN portal of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of that portal on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the portal or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco products if they are running a vulnerable release of Cisco ASA Software: 3000 Series Industrial Security Appliances, Adaptive Security Virtual Appliance (ASAv), ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches, ASA Services Module for Cisco 7600 Series Routers. Cisco Bug IDs: CSCvh20742.
漏洞信息
N/A
漏洞
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
漏洞
多款Cisco产品Adaptive Security Appliance Software 跨站脚本漏洞
漏洞信息
Cisco 3000 Series Industrial Security Appliances等都是美国思科(Cisco)公司的不同系列的安全设备。Adaptive Security Appliance(ASA)Software是其中的一套操作系统。Clientless Secure Sockets Layer(SSL)VPN是其中的一个SSL(安全套接层协议)VPN应用程序。 多款Cisco产品中的ASA Software的Clientless SSL VPN门户的Web服务器身份验证请求页面存在跨站
漏洞信息
N/A
漏洞
N/A