Vulnerabilities (CVE)

Vendor filter

Cisco Subscribe

Product filter

Ios Xe Subscribe

Filter

7 total CVE
CVE Vendors Products Updated CVSS
CVE-2019-12668 1 Cisco 2 Ios, Ios Xe 2019-10-09 3.5
A vulnerability in the web framework code of Cisco IOS and Cisco IOS XE Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of the affected software...
CVE-2019-12667 1 Cisco 1 Ios Xe 2019-10-09 3.5
A vulnerability in the web framework code of Cisco IOS XE Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of the affected software. The vulnerability...
CVE-2018-0257 1 Cisco 1 Ios Xe 2019-10-09 3.3
A vulnerability in Cisco IOS XE Software running on Cisco cBR Series Converged Broadband Routers could allow an unauthenticated, adjacent attacker to cause high CPU usage on an affected device, resulting in a denial of service (DoS) condition....
CVE-2018-0197 1 Cisco 2 Ios, Ios Xe 2019-10-09 3.3
A vulnerability in the VLAN Trunking Protocol (VTP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to corrupt the internal VTP database on an affected device and cause a denial of...
CVE-2017-12213 1 Cisco 1 Ios Xe 2019-10-09 3.3
A vulnerability in the dynamic access control list (ACL) feature of Cisco IOS XE Software running on Cisco Catalyst 4000 Series Switches could allow an unauthenticated, adjacent attacker to cause dynamic ACL assignment to fail and the port to...
CVE-2017-6665 1 Cisco 2 Ios Xe, Ios 2019-10-03 3.3
A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to reset the Autonomic Control Plane (ACP) of an affected system and view ACP packets that are...
CVE-2016-6450 1 Cisco 1 Ios Xe 2017-07-28 1.9
A vulnerability in the package unbundle utility of Cisco IOS XE Software could allow an authenticated, local attacker to gain write access to some files in the underlying operating system. This vulnerability affects the following products if they...