Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.0-000:*:*:*:*:*:*:*", "matchCriteriaId": "33C867BF-2CD0-4058-9738-22C769B03D97", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AFBF729F-2AD0-4291-AF41-184CCA230D28", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.5:hp1:*:*:*:*:*:*", "matchCriteriaId": "03D69069-DFA8-44D5-BFA2-D83A3BB9C13A", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "9D8750D2-5250-43BE-AC50-981902C0CF5C", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.6-119:*:*:*:*:*:*:*", "matchCriteriaId": "D6003553-A114-42E0-B817-D176F3A6112B", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.0-497:*:*:*:*:*:*:*", "matchCriteriaId": "3E9AF842-92F9-43A7-834A-0FFB3B619EDA", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.0.000:*:*:*:*:*:*:*", "matchCriteriaId": "27B25873-F2FA-4876-9222-362EDC3FB00A", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The proxy-cache implementation in Cisco AsyncOS 8.0.x before 8.0.7-151, 8.1.x and 8.5.x before 8.5.2-004, 8.6.x and 8.7.x before 8.7.0-171-LD, and 8.8.x before 8.8.0-085 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via multiple proxy connections, aka Bug ID CSCus10922."}, {"lang": "es", "value": "La implementaci\u00f3n proxy- cach\u00e9 en Cisco AsyncOS 8.0.x en versiones anteriores a 8.0.7-151, 8.1.x y 8.5.x en versiones anteriores a 8.5.2-004, 8.6.x y 8.7.x en versiones anteriores a 8.7.0-171-LD y 8.8 .x en versiones anteriores a 8.8.0-085 en dispositivos Web Security Appliance (WSA) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de m\u00faltiples conexiones proxy, tambi\u00e9n conocido como Bug ID CSCus10922."}], "id": "CVE-2015-6292", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2015-11-06T11:59:02.807", "references": [{"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-wsa1"}, {"source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1034062"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-wsa1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034062"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-399"}], "source": "nvd@nist.gov", "type": "Primary"}]}