Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco application policy infrastructure controller software vulnerabilities and exploits
(subscribe to this query)
5.8
CVSSv2
CVE-2017-12262
A vulnerability within the firewall configuration of the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) could allow an unauthenticated, adjacent malicious user to gain privileged access to services only available on the internal network of the devi...
Cisco Application Policy Infrastructure Controller Enterprise Module
7.2
CVSSv2
CVE-2017-12352
A vulnerability in certain system script files that are installed at boot time on Cisco Application Policy Infrastructure Controllers could allow an authenticated, local malicious user to gain elevated privileges and execute arbitrary commands with root privileges on an affected ...
Cisco Application Policy Infrastructure Controller 2.3\\(1f\\)
8.5
CVSSv2
CVE-2016-1365
The Grapevine update process in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.0 allows remote authenticated users to execute arbitrary commands as root via a crafted upgrade parameter, aka Bug ID CSCux15507.
Cisco Application Policy Infrastructure Controller Enterprise Module 1.0.10
4.6
CVSSv2
CVE-2015-6333
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.
Cisco Application Policy Infrastructure Controller 1.1\\(1j\\)
9
CVSSv2
CVE-2019-1889
A vulnerability in the REST API for software device management in Cisco Application Policy Infrastructure Controller (APIC) Software could allow an authenticated, remote malicious user to escalate privileges to root on an affected device. The vulnerability is due to incomplete va...
Cisco Application Policy Infrastructure Controller 4.1\\(1j\\)
7.2
CVSSv2
CVE-2015-6424
The boot manager in Cisco Application Policy Infrastructure Controller (APIC) 1.1(0.920a) allows local users to bypass intended access restrictions and obtain single-user-mode root access via unspecified vectors, aka Bug ID CSCuu83985.
Cisco Application Policy Infrastructure Controller 1.1\\(0.920a\\)
NA
CVE-2023-20011
A vulnerability in the web-based management interface of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Network Controller, formerly Cisco Cloud APIC, could allow an unauthenticated, remote malicious user to conduct a cross-site request forgery (CSRF) a...
Cisco Cloud Network Controller
Cisco Application Policy Infrastructure Controller
4.3
CVSSv2
CVE-2016-1318
Cross-site scripting (XSS) vulnerability in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.1 allows remote malicious users to inject arbitrary web script or HTML via crafted markup data, aka Bug ID CSCux15489.
Cisco Application Policy Infrastructure Controller Enterprise Module 1.1 Base
9
CVSSv2
CVE-2021-1580
Multiple vulnerabilities in the web UI and API endpoints of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow a remote malicious user to perform a command injection or file upload attack on an affected system. For more information about the...
Cisco Application Policy Infrastructure Controller
Cisco Cloud Application Policy Infrastructure Controller
6.4
CVSSv2
CVE-2021-1581
Multiple vulnerabilities in the web UI and API endpoints of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow a remote malicious user to perform a command injection or file upload attack on an affected system. For more information about the...
Cisco Application Policy Infrastructure Controller
Cisco Cloud Application Policy Infrastructure Controller
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »