Lucene search

K

11 matches found

CVE
CVE
added 2021/12/10 10:15 a.m.5874 views

CVE-2021-44228

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message ...

10CVSS10AI score0.94358EPSS
In wild
CVE
CVE
added 2019/08/21 7:15 p.m.175 views

CVE-2019-1937

A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing...

10CVSS9.7AI score0.91304EPSS
Web
CVE
CVE
added 2020/01/26 5:15 a.m.121 views

CVE-2019-16003

A vulnerability in the web-based management interface of Cisco UCS Director could allow an unauthenticated, remote attacker to download system log files from an affected device. The vulnerability is due to an issue in the authentication logic of the web-based management interface. An attacker could...

5.3CVSS5AI score0.01094EPSS
CVE
CVE
added 2022/05/27 2:15 p.m.96 views

CVE-2022-20765

A vulnerability in the web applications of Cisco UCS Director could allow an authenticated, remote attacker to conduct a cross-site scripting attack on an affected system. This vulnerability is due to unsanitized user input. An attacker could exploit this vulnerability by submitting custom JavaScri...

4.8CVSS4.8AI score0.00161EPSS
CVE
CVE
added 2020/06/18 3:15 a.m.76 views

CVE-2020-3242

A vulnerability in the REST API of Cisco UCS Director could allow an authenticated, remote attacker with administrative privileges to obtain confidential information from an affected device. The vulnerability exists because confidential information is returned as part of an API response. An attacke...

4.9CVSS4.9AI score0.00256EPSS
CVE
CVE
added 2019/08/21 7:15 p.m.62 views

CVE-2019-1974

A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to bypass user authentication and gain access as an administrative user. ...

10CVSS9.8AI score0.11595EPSS
CVE
CVE
added 2020/06/18 3:15 a.m.62 views

CVE-2020-3241

A vulnerability in the orchestration tasks of Cisco UCS Director could allow an authenticated, remote attacker to perform a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input on the web-based management interface. An attacker coul...

8.5CVSS6.5AI score0.00497EPSS
CVE
CVE
added 2020/08/17 6:15 p.m.58 views

CVE-2020-3464

A vulnerability in the web-based management interface of Cisco UCS Director could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interfa...

4.8CVSS4.9AI score0.0017EPSS
CVE
CVE
added 2020/05/06 5:15 p.m.49 views

CVE-2020-3329

A vulnerability in role-based access control of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow a read-only authenticated, remote attacker to disable user accounts on an affected system. The vulnerability is due to...

4.3CVSS4.7AI score0.00139EPSS
CVE
CVE
added 2019/08/21 7:15 p.m.45 views

CVE-2019-12634

A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to...

8.6CVSS7.7AI score0.01217EPSS
CVE
CVE
added 2014/02/22 9:55 p.m.39 views

CVE-2014-0709

Cisco UCS Director (formerly Cloupia) before 4.0.0.3 has a hardcoded password for the root account, which makes it easier for remote attackers to obtain administrative access via an SSH session to the CLI interface, aka Bug ID CSCui73930.

9.3CVSS7AI score0.00471EPSS
Web