CVE-2006-1961
Summary
| CVE | CVE-2006-1961 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-04-21 10:02:00 UTC |
| Updated | 2018-10-18 16:37:00 UTC |
| Description | Cisco CiscoWorks Wireless LAN Solution Engine (WLSE) and WLSE Express before 2.13, Hosting Solution Engine (HSE) and User Registration Tool (URT) before 20060419, and all versions of Ethernet Subscriber Solution Engine (ESSE) and CiscoWorks2000 Service Management Solution (SMS) allow local users to gain Linux shell access via shell metacharacters in arguments to the "show" command in the application's command line interface (CLI), aka bug ID CSCsd21502 (WLSE), CSCsd22861 (URT), and CSCsd22859 (HSE). NOTE: other issues might be addressed by the Cisco advisory. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| CiscoWorks Wireless LAN Solution Engine Cross-Site Scripting Flaw Yields Administrative Privileges and Command Line Bug Lets Remote Authenticated Users Gain Shell Access - SecurityTracker | SECTRACK | securitytracker.com | Patch |
| 24813 | OSVDB | www.osvdb.org | |
| Multiple Linux-Based Cisco Products Local Privilege Escalation Vulnerability | BID | www.securityfocus.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| Cisco Hosting Solution Engine / User Registration Tool Privilege Escalation - Advisories - Secunia | SECUNIA | secunia.com | |
| Page not found - CyberCX | Australia | MISC | www.assurance.com.au | |
| Cisco WLSE Privilege Escalation and Cross-Site Scripting - Advisories - Secunia | SECUNIA | secunia.com | Patch, Vendor Advisory |
| Cisco - Networking, Cloud, and Cybersecurity Solutions | CISCO | www.cisco.com | Patch |
| Cisco ESSE / SMS Privilege Escalation Vulnerability - Advisories - Secunia | SECUNIA | secunia.com | |
| Cisco - Networking, Cloud, and Cybersecurity Solutions | CISCO | www.cisco.com | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.