Guest

Preview Tool

Cisco Bug: CSCvv40285 - CIAM: php 5.4.4 CVE-2012-2688 and others

Last Modified

Sep 17, 2020

Products (1)

  • Cisco MATE Live

Known Affected Releases

7.2.2

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2012-2688 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2688
CVE-2015-0231 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231
CVE-2015-0273 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0273
CVE-2015-2787 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2787
CVE-2015-6835 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6835
CVE-2016-10160 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160
CVE-2016-1903 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903
CVE-2016-2554 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554
CVE-2016-3078 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3078
CVE-2016-3141 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141
CVE-2016-4344 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4344
CVE-2016-4345 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4345
CVE-2016-4346 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4346
CVE-2016-5114 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5114
CVE-2016-5768 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
CVE-2016-5769 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
CVE-2016-5770 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770
CVE-2016-5771 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
CVE-2016-5773 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
CVE-2016-6288 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288
CVE-2016-6290 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290
CVE-2016-6291 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291
CVE-2016-6294 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294
CVE-2016-6295 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295
CVE-2016-6296 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296
CVE-2016-7124 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124
CVE-2016-7126 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126
CVE-2016-7127 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
CVE-2016-7129 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
CVE-2016-7411 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411
CVE-2016-7413 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413
CVE-2016-7414 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414
CVE-2016-7417 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417
CVE-2016-7480 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7480
CVE-2016-9137 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137
CVE-2016-9138 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138
CVE-2016-9935 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935
CVE-2017-11147 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11147
CVE-2017-12933 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933
CVE-2017-8923 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923
CVE-2019-9020 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9020
CVE-2019-9023 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023
CVE-2019-9638 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638
CVE-2019-9639 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639
CVE-2019-9641 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641

These bugs were opened proactively to investigate potential security impact(s) on the product. At this time, the product is not confirmed to be affected by any of the CVE(s).

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.