CERTFR-2019-AVI-092
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Cisco N/A Cisco FXOS versions 2.4.x antérieures à 2.4.1.122 pour Firepower 4100 Series Next-Generation Firewalls et Firepower 9300 Security Appliance
Cisco NX-OS Cisco NX-OS versions antérieures à 5.2(1)SM3(2.1) pour Nexus 1000V Switch for Microsoft Hyper-V
Cisco NX-OS Cisco NX-OS versions 7.2(x) et 7.3(x) antérieures à 7.3(5)N1(1) pour Nexus 2000, 5500, 5600 et 6000 Series Switches
Cisco N/A Cisco FXOS versions 2.3.x antérieures à 2.3.1.110 pour Firepower 4100 Series Next-Generation Firewalls et Firepower 9300 Security Appliance
Cisco NX-OS Cisco NX-OS versions 4.0(x) antérieures à 4.0(2a) pour UCS 6200 et 6300 Fabric Interconnects
Cisco NX-OS Cisco NX-OS versions antérieures à 3.2(3j) pour UCS 6200 et 6300 Fabric Interconnects
Cisco NX-OS Cisco NX-OS versions antérieures à 6.0(2)A8(11) pour Nexus 3500 Platform Switches
Cisco NX-OS Cisco NX-OS versions 5.2(x) et 6.2(x) antérieures à 6.2(27) pour MDS 9000 Series Multilayer Switches
Cisco NX-OS Cisco NX-OS versions 7.x et 8.2(x) antérieures à 8.2(3) pour Nexus 7000 et 7700 Series Switches
Cisco NX-OS Cisco NX-OS versions 7.3(x) et 8.x antérieures à 8.3(2) pour MDS 9000 Series Multilayer Switches
Cisco NX-OS Cisco NX-OS versions 8.3(x) antérieures à 8.3(2) pour Nexus 7000 et 7700 Series Switches
Cisco N/A Nexus 9500 R-Series Line Cards and Fabric Modules avec un BIOS d'une version antérieure à 8.34
Cisco NX-OS Cisco NX-OS versions antérieures à 7.1(5)N1(1b) pour Nexus 2000, 5500, 5600, et 6000 Series Switches
Cisco NX-OS Cisco NX-OS versions antérieures à 7.0(3)I7(6) pour Nexus 9000 Series Switches in Standalone NX-OS Mode, Nexus 3000 Series Switches et Nexus 3500 Platform Switches,
Cisco NX-OS Cisco NX-OS versions antérieures à 14.0(3d) pour Nexus 9000 Series Fabric Switches in ACI Mode
Cisco N/A Nexus 3000 Series Switches avec un BIOS d'une version antérieure à 7.63 ou 8.34 (voir le site du constructeur pour plus de détails)
Cisco NX-OS Cisco NX-OS versions 9.2(x) antérieures à 9.2(2) pour Nexus 9000 Series Switches in Standalone NX-OS Mode, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 9500 R-Series Line Cards and Fabric Modules et Nexus 3600 Platform Switches
Cisco NX-OS Cisco NX-OS versions antérieures à 6.2(22) pour Nexus 7000 et 7700 Series Switches
Cisco NX-OS Cisco NX-OS versions antérieures à 5.2(1)SV3(4.1a) pour Nexus 1000V Switch for VMware vSphere
Cisco N/A Nexus 9000 Series Switches avec un BIOS d'une version antérieure à 7.63 ou 8.34 (voir le site du constructeur pour plus de détails)
Cisco N/A Cisco FXOS versions antérieures à 2.2.2.91 pour Firepower 4100 Series Next-Generation Firewalls et Firepower 9300 Security Appliance
Cisco NX-OS Cisco NX-OS versions antérieures à 7.0(3)F3(5) pour Nexus 9500 R-Series Line Cards and Fabric Modules et Nexus 3600 Platform Switches
References
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-privesc du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-cmdinj-1610 du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-escalation du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-tetra-ace du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-sig-verif du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nx-os-lan-auth du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-cmdinj-1611 du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-cmdinj-1608 du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-npv-dos du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-cmdinj-1609 du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-cmdinj-1607 du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-file-access du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-cmdinj-1612 du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-NXAPI-cmdinj du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nx-os-api-ex du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-cmdinj-1613 du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-fabric-dos du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-directory du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nx-os-bash-escal du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxosldap du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-netstack du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-cmdinj-1606 du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-aci-shell-escape du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-pe du 06 mars 2019 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20190306-nxos-privesca du 06 mars 2019 None vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Cisco FXOS versions 2.4.x ant\u00e9rieures \u00e0 2.4.1.122 pour Firepower 4100 Series Next-Generation Firewalls et Firepower 9300 Security Appliance",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions ant\u00e9rieures \u00e0 5.2(1)SM3(2.1) pour Nexus 1000V Switch for Microsoft Hyper-V",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions 7.2(x) et 7.3(x) ant\u00e9rieures \u00e0 7.3(5)N1(1) pour Nexus 2000, 5500, 5600 et 6000 Series Switches",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco FXOS versions 2.3.x ant\u00e9rieures \u00e0 2.3.1.110 pour Firepower 4100 Series Next-Generation Firewalls et Firepower 9300 Security Appliance",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions 4.0(x) ant\u00e9rieures \u00e0 4.0(2a) pour UCS 6200 et 6300 Fabric Interconnects",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions ant\u00e9rieures \u00e0 3.2(3j) pour UCS 6200 et 6300 Fabric Interconnects",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions ant\u00e9rieures \u00e0 6.0(2)A8(11) pour Nexus 3500 Platform Switches",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions 5.2(x) et 6.2(x) ant\u00e9rieures \u00e0 6.2(27) pour MDS 9000 Series Multilayer Switches",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions 7.x et 8.2(x) ant\u00e9rieures \u00e0 8.2(3) pour Nexus 7000 et 7700 Series Switches",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions 7.3(x) et 8.x ant\u00e9rieures \u00e0 8.3(2) pour MDS 9000 Series Multilayer Switches",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions 8.3(x) ant\u00e9rieures \u00e0 8.3(2) pour Nexus 7000 et 7700 Series Switches",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Nexus 9500 R-Series Line Cards and Fabric Modules avec un BIOS d\u0027une version ant\u00e9rieure \u00e0 8.34",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions ant\u00e9rieures \u00e0 7.1(5)N1(1b) pour Nexus 2000, 5500, 5600, et 6000 Series Switches",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions ant\u00e9rieures \u00e0 7.0(3)I7(6) pour Nexus 9000 Series Switches in Standalone NX-OS Mode, Nexus 3000 Series Switches et Nexus 3500 Platform Switches,",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions ant\u00e9rieures \u00e0 14.0(3d) pour Nexus 9000 Series Fabric Switches in ACI Mode",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Nexus 3000 Series Switches avec un BIOS d\u0027une version ant\u00e9rieure \u00e0 7.63 ou 8.34 (voir le site du constructeur pour plus de d\u00e9tails)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions 9.2(x) ant\u00e9rieures \u00e0 9.2(2) pour Nexus 9000 Series Switches in Standalone NX-OS Mode, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 9500 R-Series Line Cards and Fabric Modules et Nexus 3600 Platform Switches",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions ant\u00e9rieures \u00e0 6.2(22) pour Nexus 7000 et 7700 Series Switches",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions ant\u00e9rieures \u00e0 5.2(1)SV3(4.1a) pour Nexus 1000V Switch for VMware vSphere",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Nexus 9000 Series Switches avec un BIOS d\u0027une version ant\u00e9rieure \u00e0 7.63 ou 8.34 (voir le site du constructeur pour plus de d\u00e9tails)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco FXOS versions ant\u00e9rieures \u00e0 2.2.2.91 pour Firepower 4100 Series Next-Generation Firewalls et Firepower 9300 Security Appliance",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco NX-OS versions ant\u00e9rieures \u00e0 7.0(3)F3(5) pour Nexus 9500 R-Series Line Cards and Fabric Modules et Nexus 3600 Platform Switches",
      "product": {
        "name": "NX-OS",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-1607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1607"
    },
    {
      "name": "CVE-2019-1597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1597"
    },
    {
      "name": "CVE-2019-1593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1593"
    },
    {
      "name": "CVE-2019-1599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1599"
    },
    {
      "name": "CVE-2019-1617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1617"
    },
    {
      "name": "CVE-2019-1605",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1605"
    },
    {
      "name": "CVE-2019-1616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1616"
    },
    {
      "name": "CVE-2019-1594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1594"
    },
    {
      "name": "CVE-2019-1591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1591"
    },
    {
      "name": "CVE-2019-1604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1604"
    },
    {
      "name": "CVE-2019-1603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1603"
    },
    {
      "name": "CVE-2019-1611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1611"
    },
    {
      "name": "CVE-2019-1601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1601"
    },
    {
      "name": "CVE-2019-1606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1606"
    },
    {
      "name": "CVE-2019-1602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1602"
    },
    {
      "name": "CVE-2019-1614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1614"
    },
    {
      "name": "CVE-2019-1596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1596"
    },
    {
      "name": "CVE-2019-1598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1598"
    },
    {
      "name": "CVE-2019-1618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1618"
    },
    {
      "name": "CVE-2019-1613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1613"
    },
    {
      "name": "CVE-2019-1612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1612"
    },
    {
      "name": "CVE-2019-1608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1608"
    },
    {
      "name": "CVE-2019-1600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1600"
    },
    {
      "name": "CVE-2019-1609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1609"
    },
    {
      "name": "CVE-2019-1615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1615"
    },
    {
      "name": "CVE-2019-1610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1610"
    }
  ],
  "initial_release_date": "2019-03-07T00:00:00",
  "last_revision_date": "2019-03-07T00:00:00",
  "links": [],
  "reference": "CERTFR-2019-AVI-092",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2019-03-07T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-privesc du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesc"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-cmdinj-1610 du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1610"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-escalation du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-escalation"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-tetra-ace du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-tetra-ace"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-sig-verif du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-sig-verif"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nx-os-lan-auth du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nx-os-lan-auth"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-cmdinj-1611 du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1611"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-cmdinj-1608 du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1608"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-npv-dos du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-npv-dos"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-cmdinj-1609 du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1609"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-cmdinj-1607 du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1607"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-file-access du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-file-access"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-cmdinj-1612 du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1612"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-NXAPI-cmdinj du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-NXAPI-cmdinj"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nx-os-api-ex du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nx-os-api-ex"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-cmdinj-1613 du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1613"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-fabric-dos du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-fabric-dos"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-directory du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-directory"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nx-os-bash-escal du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nx-os-bash-escal"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxosldap du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxosldap"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-netstack du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-netstack"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-cmdinj-1606 du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1606"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-aci-shell-escape du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-aci-shell-escape"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-pe du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-pe"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190306-nxos-privesca du 06 mars 2019",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesca"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…