Page 2 of 15 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The Management subsystem in Cisco Unified Computing System 2.1(3f) and earlier allows remote attackers to obtain sensitive information by reading log files, aka Bug ID CSCur99239. El subsistema Management en Cisco Unified Computing System 2.1(3f) y anteriores permite a atacantes remotos obtener información sensible mediante la lectura de ficheros del registro, también conocido como Bug ID CSCur99239. Cisco Unified Computing System Manager (UCSM) versions 1.3 through 2.2 sends local (UCSM) username and password hashes to the configured SYSLOG server every 12 hours. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8009 http://tools.cisco.com/security/center/viewAlert.x?alertId=36640 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Cisco Integrated Management Controller in Cisco Unified Computing System 2.2(2c)A and earlier allows local users to obtain shell access via a crafted map-nfs command, aka Bug ID CSCup05998. Cisco Integrated Management Controller en Cisco Unified Computing System 2.2(2c)A y anteriores permite a usuarios locales obtener acceso de shell a través de un comando map-nfs manipulado, también conocido como Bug ID CSCup05998. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8003 http://tools.cisco.com/security/center/viewAlert.x?alertId=36562 • CWE-20: Improper Input Validation •

CVSS: 8.5EPSS: 0%CPEs: 4EXPL: 0

The Baseboard Management Controller (BMC) in Cisco Unified Computing System (UCS) does not properly handle SSH escape sequences, which allows remote authenticated users to bypass an unspecified authentication step via SSH port forwarding, aka Bug ID CSCtg17656. El Baseboard Management Controller (BMC) en Cisco Unified Computing System (UCS) no maneja correctamente secuencias de escape SSH, lo cual permite a usuarios autenticados remotamente saltarse un paso no especificado de autentificación a través del reenvío de puertos SSH, aka Bug ID CSCtg17656. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4078 http://www.securitytracker.com/id/1029084 https://exchange.xforce.ibmcloud.com/vulnerabilities/87367 • CWE-287: Improper Authentication •

CVSS: 4.6EPSS: 0%CPEs: 17EXPL: 0

MCServer in the Cisco Management Controller in Cisco Unified Computing System (UCS) allows local users to cause a denial of service (application crash) via invalid MCTools parameters, aka Bug ID CSCtg20734. MCServer en Cisco Management Controller de Cisco Unified Computing System (UCS) permite a usuarios locales causar una denegación de servicio (cuelgue de aplicación) a través de parámetros inválidos de MCTools, tambien conocido como Bug ID CSCtg20734. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4081 http://www.securitytracker.com/id/1029065 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 0%CPEs: 41EXPL: 0

The web interface in the Manager component in Cisco Unified Computing System (UCS) 1.x and 2.x before 2.0(2m) allows remote attackers to obtain sensitive information by reading a (1) technical-support bundle file or (2) on-device configuration backup, aka Bug ID CSCtq86543. La interfaz web en el componente Manager de Cisco Unified Computing System (UCS) v1.x y v2.x antes v2.0(2m) permite a atacantes remotos obtener información sensible mediante la lectura de un (1) archivo de paquete de soporte técnico o (2) el Respaldar la configuración del equipo, también conocido como Bug ID CSCtq86543. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-ucsmulti • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •