Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco unified computing system software - vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2018-0430
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote malicious user to inject and execute arbitrary commands with root privileges on an affected device. The vulnerability is due to insu...
Cisco Unified Computing System 3.1\\(3\\)
Cisco Unified Computing System 3.0\\(3a\\)
Cisco Unified Computing System 2.0 Base
NA
CVE-2015-0599
The web interface in Cisco Integrated Management Controller in Cisco Unified Computing System (UCS) on C-Series Rack Servers does not properly restrict use of IFRAME elements, which makes it easier for remote malicious users to conduct clickjacking attacks and unspecified other a...
Cisco Unified Computing System -
1 Github repository
NA
CVE-2015-4259
The Integrated Management Controller on Cisco Unified Computing System (UCS) C servers with software 1.5(3) and 1.6(0.16) has a default SSL certificate, which makes it easier for man-in-the-middle malicious users to bypass cryptographic protection mechanisms by leveraging knowled...
Cisco Unified Computing System 1.5\\(3\\)
Cisco Unified Computing System 1.6\\(0.16\\)
7.5
CVSSv3
CVE-2018-0094
A vulnerability in IPv6 ingress packet processing for Cisco UCS Central Software could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition due to high CPU utilization on the targeted device. The vulnerability is due to insufficient rate li...
Cisco Unified Computing System Central Software 1.4\\(1a\\)
6.7
CVSSv3
CVE-2017-12333
A vulnerability in Cisco NX-OS System Software could allow an authenticated, local malicious user to bypass signature verification when loading a software image. The vulnerability is due to insufficient NX-OS signature verification for software images. An authenticated, local att...
Cisco Nx-os 8.1\\(1\\)
Cisco Unified Computing System 7.0\\(0\\)hsk\\(0.357\\)
6.7
CVSSv3
CVE-2017-12331
A vulnerability in Cisco NX-OS System Software could allow an authenticated, local malicious user to bypass signature verification when loading a software patch. The vulnerability is due to insufficient NX-OS signature verification for software patches. An authenticated, local at...
Cisco Nx-os 8.1\\(1\\)
Cisco Unified Computing System 7.0\\(0\\)hsk\\(0.357\\)
8.8
CVSSv3
CVE-2018-0113
A vulnerability in an operations script of Cisco UCS Central could allow an authenticated, remote malicious user to execute arbitrary shell commands with the privileges of the daemon user. The vulnerability is due to insufficient input validation. An attacker could exploit this v...
Cisco Unified Computing System Central Software 1.5\\(1c\\)
NA
CVE-2015-4183
Cisco UCS Central Software 1.2(1a) allows local users to gain privileges for OS command execution via a crafted CLI parameter, aka Bug ID CSCut32795.
Cisco Unified Computing System 1.2\\(1a\\)
7.8
CVSSv3
CVE-2019-1966
A vulnerability in a specific CLI command within the local management (local-mgmt) context for Cisco UCS Fabric Interconnect Software could allow an authenticated, local malicious user to gain elevated privileges as the root user on an affected device. The vulnerability is due to...
Cisco Nx-os
Cisco Nx-os 4.0
Cisco Unified Computing System 4.0\\(1a\\)a
Cisco Unified Computing System 3.2\\(3b\\)a
5.5
CVSSv3
CVE-2019-1725
A vulnerability in the local management CLI implementation for specific commands on the Cisco UCS B-Series Blade Servers could allow an authenticated, local malicious user to overwrite an arbitrary file on disk. It is also possible the attacker could inject CLI command parameters...
Cisco Unified Computing System
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »