Page 2 of 13 results (0.009 seconds)

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

A SQL Injection vulnerability in the web framework of Cisco Prime Service Catalog could allow an unauthenticated, remote attacker to execute unauthorized Structured Query Language (SQL) queries. The vulnerability is due to a failure to validate user-supplied input that is used in SQL queries. An attacker could exploit this vulnerability by sending a crafted SQL statement to an affected system. Successful exploitation could allow the attacker to read entries in some database tables. Cisco Bug IDs: CSCvg30333. • http://www.securityfocus.com/bid/102004 http://www.securitytracker.com/id/1039926 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-prime • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

A vulnerability in the web framework code of Cisco Prime Service Catalog could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the user of the web interface of the affected system. More Information: CSCvc79842 CSCvc79846 CSCvc79855 CSCvc79873 CSCvc79882 CSCvc79891. Known Affected Releases: 11.1.2. Una vulnerabilidad en el código marco web de Cisco Prime Service Catalog podría permitir que un atacante remoto no autenticado lleve a cabo un ataque XSS (cross-site scripting) contra el usuario de la interfaz web del sistema afectado. Más información: CSCvc79842 CSCvc79846 CSCvc79855 CSCvc79873 CSCvc79882 CSCvc79891. • http://www.securityfocus.com/bid/96917 http://www.securitytracker.com/id/1038045 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-psc • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

A vulnerability in the web framework of Cisco Prime Service Catalog could allow an authenticated, remote attacker to conduct a web URL redirect attack against a user who is logged in to an affected system. More Information: CSCvb21745. Known Affected Releases: 10.0_R2_tanggula. Una vulnerabilidad en el marco web de Cisco Prime Service Catalog podría permitir que un atacante remoto autenticado lleve a cabo un ataque de redirección de URL web contra un usuario que ha iniciado sesión en un sistema afectado. Más información: CSCvb21745. • http://www.securityfocus.com/bid/95947 http://www.securitytracker.com/id/1037772 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-psc • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the web-based management interface in Cisco Prime Service Catalog (PSC) 11.0 allows remote attackers to inject arbitrary web script or HTML via a crafted value, aka Bug ID CSCuz63795. Vulnerabilidad de XSS en la interfaz de gestión basada en web en Cisco Prime Service Catalog (PSC) 11.0 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de un valor manipulado, también conocido como Bug ID CSCuz63795. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-psc http://www.securityfocus.com/bid/92156 http://www.securitytracker.com/id/1036472 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

Cisco Prime Service Catalog 10.0, 10.0(R2), 10.1, and 11.0 does not properly restrict access to web pages, which allows remote attackers to modify the configuration via a direct request, aka Bug ID CSCuw48188. Cisco Prime Service Catalog 10.0, 10.0(R2), 10.1 y 11.0 no restringe adecuadamente el acceso a páginas web, lo que permite a atacantes remotos modificar la configuración a través de una petición directa, también conocido como Bug ID CSCuw48188. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151207-psc http://www.securitytracker.com/id/1034313 • CWE-264: Permissions, Privileges, and Access Controls •