Enterprise Network Virtualization Software Cisco Enterprise Network Virtualization Software

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Cisco Enterprise Network Virtualization Software.

By the Year

In 2026 there have been 0 vulnerabilities in Cisco Enterprise Network Virtualization Software. Enterprise Network Virtualization Software did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 2 4.90

It may take a day or so for new Enterprise Network Virtualization Software vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Cisco Enterprise Network Virtualization Software Security Vulnerabilities

A vulnerability in Cisco Enterprise NFV Infrastructure Software (NFVIS) could
CVE-2018-15402 - October 17, 2018

A vulnerability in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, remote attacker to conduct cross-site request forgery (CSRF) attacks. The vulnerability is due to improper validation of Origin headers on HTTP requests within the management interface. An attacker could exploit this vulnerability by convincing a targeted user to follow a URL to a malicious website. An exploit could allow the attacker to take actions within the software with the privileges of the targeted user or gain access to sensitive information.

Session Riding

A vulnerability in the user management functionality of Cisco Enterprise NFV Infrastructure Software (NFVIS) could
CVE-2018-0462 4.9 - Medium - October 05, 2018

A vulnerability in the user management functionality of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to perform a denial of service (DoS) attack against an affected system. The vulnerability is due to insufficient validation of user-provided input. An attacker could exploit this vulnerability by logging in with a highly privileged user account and performing a sequence of specific user management operations that interfere with the underlying operating system. A successful exploit could allow the attacker to permanently degrade the functionality of the affected system.

Improper Input Validation

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Cisco Enterprise Network Virtualization Software or by Cisco? Click the Watch button to subscribe.

Cisco
Vendor

subscribe