Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco ucs manager vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 prior to 1.0.2a allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
Openssl Openssl 1.0.2
3 Github repositories
2 Articles
4.3
CVSSv2
CVE-2015-0285
The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 prior to 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote malicious users to defeat cryptographic protection mechanisms by sniffing the network and then...
Openssl Openssl 1.0.2
5
CVSSv2
CVE-2015-0207
The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 prior to 1.0.2a does not properly isolate the state information of independent data streams, which allows remote malicious users to cause a denial of service (application crash) via crafted DTLS traffic, as demonstrated by DT...
Openssl Openssl 1.0.2
4.3
CVSSv2
CVE-2015-0208
The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c in OpenSSL 1.0.2 prior to 1.0.2a allows remote malicious users to cause a denial of service (NULL pointer dereference and application crash) via crafted RSA PSS parameters to...
Openssl Openssl 1.0.2
6.8
CVSSv2
CVE-2015-0209
Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL prior to 0.9.8zf, 1.0.0 prior to 1.0.0r, 1.0.1 prior to 1.0.1m, and 1.0.2 prior to 1.0.2a might allow remote malicious users to cause a denial of service (memory corruption and applica...
Openssl Openssl 1.0.1j
Openssl Openssl 1.0.0n
Openssl Openssl 1.0.0c
Openssl Openssl 1.0.0i
Openssl Openssl 1.0.1h
Openssl Openssl 1.0.0m
Openssl Openssl 1.0.1c
Openssl Openssl 1.0.1g
Openssl Openssl 1.0.0h
Openssl Openssl 1.0.0e
Openssl Openssl 1.0.0f
Openssl Openssl 1.0.0d
Openssl Openssl 1.0.0j
Openssl Openssl 1.0.0p
Openssl Openssl 1.0.1a
Openssl Openssl 1.0.0o
Openssl Openssl 1.0.1d
Openssl Openssl 1.0.0k
Openssl Openssl 1.0.1k
Openssl Openssl 1.0.0
Openssl Openssl 1.0.1b
Openssl Openssl 1.0.1e
5
CVSSv2
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected ...
Openssl Openssl 1.0.1j
10
CVSSv2
CVE-2014-6278
GNU Bash up to and including 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote malicious users to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feat...
Gnu Bash 1.14.5
Gnu Bash 1.14.6
Gnu Bash 2.03
Gnu Bash 2.04
Gnu Bash 3.2.48
Gnu Bash 4.0
Gnu Bash 1.14.1
Gnu Bash 1.14.2
Gnu Bash 2.01
Gnu Bash 2.01.1
Gnu Bash 3.0
Gnu Bash 3.0.16
Gnu Bash 4.2
Gnu Bash 4.3
Gnu Bash 1.14.0
Gnu Bash 1.14.7
Gnu Bash 2.0
Gnu Bash 2.05
Gnu Bash 4.1
Gnu Bash 1.14.3
Gnu Bash 1.14.4
Gnu Bash 2.02
5 EDB exploits
12 Github repositories
5.8
CVSSv2
CVE-2012-4092
The management interface in the Central Software component in Cisco Unified Computing System (UCS) does not properly validate the identity of vCenter consoles, which allows man-in-the-middle malicious users to read or modify an inter-device data stream by spoofing an identity, ak...
Cisco Unified Computing System -
4.6
CVSSv2
CVE-2012-4093
The Manager component in Cisco Unified Computing System (UCS) allows local users to cause a denial of service via an invalid Smart Call Home contact address, aka Bug ID CSCtl00186.
Cisco Unified Computing System -
8.3
CVSSv2
CVE-2013-1178
Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x prior to 5.2(4) and 6.x prior to 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x prior to 5.1(3)N1(1), Nexus 4000 devices prior to 4.1(2)E1(1h), Nexus 3...
Cisco Nx-os 4.1\\(3\\)n1\\(1\\)
Cisco Nx-os 4.0\\(1a\\)n1\\(1a\\)
Cisco Nx-os 4.0\\(1a\\)n2\\(1\\)
Cisco Nx-os 4.1\\(3\\)n1\\(1a\\)
Cisco Nx-os 4.2.\\(2a\\)
Cisco Nx-os 4.2\\(6\\)
Cisco Nx-os 4.2\\(3\\)
Cisco Nx-os 4.1.\\(5\\)
Cisco Nx-os 5.0\\(3\\)n2\\(2\\)
Cisco Nx-os 5.1\\(3\\)n1\\(1\\)
Cisco Nx-os 5.0\\(3\\)n1\\(1c\\)
Cisco Nx-os 5.0\\(3\\)n1\\(1\\)
Cisco Nx-os 5.0\\(5\\)
Cisco Nx-os 5.2\\(3a\\)
Cisco Nx-os 5.2\\(1\\)
Cisco Nx-os 5.1\\(6\\)
Cisco Nx-os 4.2\\(1\\)sv1\\(5.1\\)
Cisco Nx-os 4.0\\(4\\)sv1\\(3d\\)
Cisco Nx-os 4.0\\(4\\)sv1\\(3\\)
Cisco Nx-os 4.0\\(4\\)sv1\\(3a\\)
Cisco Nx-os 4.2\\(1\\)n2\\(1\\)
Cisco Nx-os 4.2\\(1\\)n1\\(1\\)
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
NEXT »