Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote malicious user to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco ucs director 6.0.0.0 |
||
cisco ucs director 6.0.0.1 |
||
cisco ucs director 6.0.1.0 |
||
cisco ucs director 6.0.1.1 |
||
cisco ucs director 6.0.1.2 |
||
cisco ucs director 6.0.1.3 |
||
cisco ucs director 6.5.0.0 |
||
cisco ucs director 6.5.0.1 |
||
cisco ucs director 6.5.0.2 |
||
cisco ucs director 6.5.0.3 |
||
cisco ucs director 6.5.0.4 |
||
cisco ucs director 6.6.0.0 |
||
cisco ucs director 6.6.1.0 |
||
cisco ucs director 6.6.2.0 |
||
cisco ucs director 6.7.0.0 |
||
cisco ucs director 6.7.1.0 |
||
cisco ucs director 6.7.2.0 |
||
cisco ucs director 6.7.3.0 |
||
cisco ucs director express for big data |