Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
prime infrastructure vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2015-6262
Cross-site request forgery (CSRF) vulnerability in Cisco Prime Infrastructure 1.2(0.103) and 2.0(0.0) allows remote malicious users to hijack the authentication of arbitrary users, aka Bug IDs CSCum49054 and CSCum49059.
Cisco Prime Infrastructure 1.2.0.103
Cisco Prime Infrastructure 2.0
6.8
CVSSv2
CVE-2015-0209
Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL prior to 0.9.8zf, 1.0.0 prior to 1.0.0r, 1.0.1 prior to 1.0.1m, and 1.0.2 prior to 1.0.2a might allow remote malicious users to cause a denial of service (memory corruption and applica...
Openssl Openssl 1.0.1j
Openssl Openssl 1.0.0n
Openssl Openssl 1.0.0c
Openssl Openssl 1.0.0i
Openssl Openssl 1.0.1h
Openssl Openssl 1.0.0m
Openssl Openssl 1.0.1c
Openssl Openssl 1.0.1g
Openssl Openssl 1.0.0h
Openssl Openssl 1.0.0e
Openssl Openssl 1.0.0f
Openssl Openssl 1.0.0d
Openssl Openssl 1.0.0j
Openssl Openssl 1.0.0p
Openssl Openssl 1.0.1a
Openssl Openssl 1.0.0o
Openssl Openssl 1.0.1d
Openssl Openssl 1.0.0k
Openssl Openssl 1.0.1k
Openssl Openssl 1.0.0
Openssl Openssl 1.0.1b
Openssl Openssl 1.0.1e
6.8
CVSSv2
CVE-2014-2152
Cross-site request forgery (CSRF) vulnerability in the INSERT page in Cisco Prime Infrastructure (PI) allows remote malicious users to hijack the authentication of arbitrary users, aka Bug ID CSCun21868.
Cisco Prime Infrastructure -
6.8
CVSSv2
CVE-2013-1153
Cross-site request forgery (CSRF) vulnerability in the web interface in Cisco Prime Infrastructure allows remote malicious users to hijack the authentication of arbitrary users, aka Bug ID CSCue84676.
Cisco Prime Infrastructure -
6.5
CVSSv2
CVE-2015-7849
Use-after-free vulnerability in ntpd in NTP 4.2.x prior to 4.2.8p4, and 4.3.x prior to 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.
Ntp Ntp
Ntp Ntp 4.2.8
Netapp Oncommand Balance -
Netapp Oncommand Performance Manager -
Netapp Oncommand Unified Manager -
Netapp Clustered Data Ontap -
Netapp Data Ontap -
6.5
CVSSv2
CVE-2015-7854
Buffer overflow in the password management functionality in NTP 4.2.x prior to 4.2.8p4, and 4.3.x prior to 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.
Ntp Ntp
Ntp Ntp 4.2.8
Netapp Oncommand Balance -
Netapp Oncommand Performance Manager -
Netapp Oncommand Unified Manager -
Netapp Clustered Data Ontap -
Netapp Data Ontap -
6.5
CVSSv2
CVE-2016-6443
A vulnerability in the Cisco Prime Infrastructure and Evolved Programmable Network Manager SQL database interface could allow an authenticated, remote malicious user to impact system confidentiality by executing a subset of arbitrary SQL queries that can cause product instability...
Cisco Evolved Programmable Network Manager 2.0
Cisco Prime Infrastructure 1.3.0.20
Cisco Prime Infrastructure 1.4.0.45
Cisco Prime Infrastructure 3.0
Cisco Prime Infrastructure 3.1.1
Cisco Prime Infrastructure 1.2
Cisco Prime Infrastructure 1.2.0.103
Cisco Prime Infrastructure 1.2.1
Cisco Prime Infrastructure 1.3
Cisco Prime Infrastructure 1.4.2
Cisco Prime Infrastructure 2.0
Cisco Prime Infrastructure 2.1.0
Cisco Prime Infrastructure 2.2
Cisco Evolved Programmable Network Manager 1.2
Cisco Prime Infrastructure 1.4
Cisco Prime Infrastructure 1.4.1
Cisco Prime Infrastructure 2.2\\(2\\)
Cisco Prime Infrastructure 3.1
6.5
CVSSv2
CVE-2016-1408
Cisco Prime Infrastructure 1.2 up to and including 3.1 and Evolved Programmable Network Manager (EPNM) 1.2 and 2.0 allow remote authenticated users to execute arbitrary commands or upload files via a crafted HTTP request, aka Bug ID CSCuz01488.
Cisco Prime Infrastructure 2.2\\(2\\)
Cisco Prime Infrastructure 2.2
Cisco Prime Infrastructure 1.4
Cisco Prime Infrastructure 2.0
Cisco Prime Infrastructure 1.2.0.103
Cisco Prime Infrastructure 1.4.0.45
Cisco Prime Infrastructure 1.2.1
Cisco Prime Infrastructure 1.3
Cisco Prime Infrastructure 3.1
Cisco Prime Infrastructure 3.0
Cisco Prime Infrastructure 1.3.0.20
Cisco Prime Infrastructure 1.4.2
Cisco Prime Infrastructure 1.2
Cisco Prime Infrastructure 1.4.1
Cisco Prime Infrastructure 2.1.0
Cisco Evolved Programmable Network Manager 1.2.300
Cisco Evolved Programmable Network Manager 1.2.200
Cisco Evolved Programmable Network Manager 1.2.1.3
Cisco Evolved Programmable Network Manager 1.2.0
Cisco Evolved Programmable Network Manager 1.2.500
Cisco Evolved Programmable Network Manager 1.2.400
6.5
CVSSv2
CVE-2016-1406
The API web interface in Cisco Prime Infrastructure prior to 3.1 and Cisco Evolved Programmable Network Manager prior to 1.2.4 allows remote authenticated users to bypass intended RBAC restrictions and obtain sensitive information, and consequently gain privileges, via crafted JS...
Cisco Evolved Programmable Network Manager 1.2.1.3
Cisco Evolved Programmable Network Manager 1.2.0
Cisco Prime Infrastructure 1.4.2
Cisco Prime Infrastructure 1.4.1
Cisco Prime Infrastructure 2.2\\(2\\)
Cisco Prime Infrastructure 2.2
Cisco Prime Infrastructure 1.2.0.103
Cisco Prime Infrastructure 2.0
Cisco Prime Infrastructure 1.2.1
Cisco Prime Infrastructure 3.0
Cisco Prime Infrastructure 2.1.0
Cisco Prime Infrastructure 1.4
Cisco Evolved Programmable Network Manager 1.2.300
Cisco Evolved Programmable Network Manager 1.2.200
Cisco Prime Infrastructure 1.4.0.45
Cisco Prime Infrastructure 1.3.0.20
Cisco Prime Infrastructure 1.3
Cisco Prime Infrastructure 1.2
6.5
CVSSv2
CVE-2016-1359
Cisco Prime Infrastructure 3.0 allows remote authenticated users to execute arbitrary code via a crafted HTTP request that is mishandled during viewing of a log file, aka Bug ID CSCuw81494.
Cisco Prime Infrastructure 3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »