Page 5 of 24 results (0.049 seconds)

CVSS: 6.5EPSS: 0%CPEs: 37EXPL: 0

A vulnerability in the Cisco Nexus 9000 Series Platform Leaf Switches for Application Centric Infrastructure (ACI) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability affects Cisco Nexus 9000 Series Leaf Switches (TOR) - ACI Mode and Cisco Application Policy Infrastructure Controller (APIC). More Information: CSCuy93241. Known Affected Releases: 11.2(2x) 11.2(3x) 11.3(1x) 11.3(2x) 12.0(1x). Known Fixed Releases: 11.2(2i) 11.2(2j) 11.2(3f) 11.2(3g) 11.2(3h) 11.2(3l) 11.3(0.236) 11.3(1j) 11.3(2i) 11.3(2j) 12.0(1r). • http://www.securityfocus.com/bid/94077 http://www.securitytracker.com/id/1037185 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-n9kapic • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

The installation procedure on Cisco Application Policy Infrastructure Controller (APIC) devices 1.3(2f) mishandles binary files, which allows local users to obtain root access via unspecified vectors, aka Bug ID CSCva50496. El procedimiento de instalación en dispositivos 1.3(2f) Cisco Application Policy Infrastructure Controller (APIC) maneja incorrectamente archivos binarios, lo que permite a usuarios locales obtener acceso de root a través de vectores no especificados, vulnerabilidad también conocida como Bug ID CSCva50496. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-apic http://www.securitytracker.com/id/1036872 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The boot manager in Cisco Application Policy Infrastructure Controller (APIC) 1.1(0.920a) allows local users to bypass intended access restrictions and obtain single-user-mode root access via unspecified vectors, aka Bug ID CSCuu83985. El boot manager en Cisco Application Policy Infrastructure Controller (APIC) 1.1(0.920a) permite a usuarios locales eludir las restricciones destinadas al acceso y obtener acceso root modo-solo-usuario a través de vectores no especificados, también conocido como Bug ID CSCuu83985. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151216-apic http://www.securityfocus.com/bid/79410 http://www.securitytracker.com/id/1034468 • CWE-255: Credentials Management Errors •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076. Cisco Application Policy Infrastructure Controller (APIC) 1.1j permite a usuarios locales ganar privilegios a través de vectores que involucran la adición de una llave SSH, también conocido como Bug ID CSCuw46076. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151012-apic http://www.securitytracker.com/id/1033793 • CWE-264: Permissions, Privileges, and Access Controls •