Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
unified computing system vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2019-1966
A vulnerability in a specific CLI command within the local management (local-mgmt) context for Cisco UCS Fabric Interconnect Software could allow an authenticated, local malicious user to gain elevated privileges as the root user on an affected device. The vulnerability is due to...
Cisco Nx-os
Cisco Nx-os 4.0
Cisco Unified Computing System 4.0\\(1a\\)a
Cisco Unified Computing System 3.2\\(3b\\)a
7.2
CVSSv2
CVE-2015-4183
Cisco UCS Central Software 1.2(1a) allows local users to gain privileges for OS command execution via a crafted CLI parameter, aka Bug ID CSCut32795.
Cisco Unified Computing System 1.2\\(1a\\)
6.8
CVSSv2
CVE-2014-7989
Cisco Unified Computing System on B-Series blade servers allows local users to gain shell privileges via a crafted (1) ping6 or (2) traceroute6 command, aka Bug ID CSCuq38176.
Cisco B440 M2 -
Cisco B260 M4 -
Cisco B230 M2 -
Cisco B420 M3 -
Cisco B22 M3 -
Cisco B460 M4 -
Cisco B200 M3 -
Cisco B200 M4 -
4
CVSSv2
CVE-2019-1627
A vulnerability in the Server Utilities of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote malicious user to gain unauthorized access to sensitive user information from the configuration data that is stored on the affected system. The vulnerabili...
Cisco Integrated Management Controller -
Cisco Unified Computing System 4.0\\(1c\\)hs3
2.1
CVSSv2
CVE-2019-1628
A vulnerability in the web server of Cisco Integrated Management Controller (IMC) could allow an authenticated, local malicious user to cause a buffer overflow, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds ch...
Cisco Integrated Management Controller -
Cisco Unified Computing System 4.0\\(1c\\)hs3
5
CVSSv2
CVE-2019-1629
A vulnerability in the configuration import utility of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote malicious user to have write access and upload arbitrary data to the filesystem. The vulnerability is due to a failure to delete temporarily ...
Cisco Integrated Management Controller -
Cisco Unified Computing System 4.0\\(1c\\)hs3
2.1
CVSSv2
CVE-2019-1630
A vulnerability in the firmware signature checking program of Cisco Integrated Management Controller (IMC) could allow an authenticated, local malicious user to cause a buffer overflow, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient che...
Cisco Integrated Management Controller -
Cisco Unified Computing System 4.0\\(1c\\)hs3
5
CVSSv2
CVE-2019-1631
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote malicious user to access potentially sensitive system usage information. The vulnerability is due to a lack of proper data protection mecha...
Cisco Integrated Management Controller -
Cisco Unified Computing System 4.0\\(1c\\)hs3
6
CVSSv2
CVE-2019-1632
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote malicious user to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability i...
Cisco Integrated Management Controller -
Cisco Unified Computing System 4.0\\(1c\\)hs3
7.2
CVSSv2
CVE-2019-1879
A vulnerability in the CLI of Cisco Integrated Management Controller (IMC) could allow an authenticated, local malicious user to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient validation of user-supplied input at the CLI...
Cisco Unified Computing System 4.0\\(1c\\)hs3
Cisco Integrated Management Controller -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »