Cisco FireSIGHT System Software 5.3.0, 5.3.1, 5.4.0, 6.0, and 6.0.1 allows remote attackers to bypass Snort rules via crafted parameters in the header of an HTTP packet, aka Bug ID CSCuz20737.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-firesight - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/92152 - | |
References | () http://www.securitytracker.com/id/1036471 - |
Information
Published : 2016-07-28 01:59
Updated : 2024-11-21 02:46
NVD link : CVE-2016-1463
Mitre link : CVE-2016-1463
CVE.ORG link : CVE-2016-1463
JSON object : View
Products Affected
cisco
- firesight_system_software
CWE
CWE-20
Improper Input Validation