Page 5 of 25 results (0.004 seconds)

CVSS: 8.0EPSS: 0%CPEs: 2EXPL: 0

A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user to follow a malicious link. A successful exploit could allow the attacker to use a web browser and the privileges of the user to perform arbitrary actions on the affected device. Una vulnerabilidad en la interfaz de administración basada en web de Integrated Management Controller (IMC) de Cisco, podría permitir a un atacante remoto autenticado conducir un ataque de tipo cross-site request forgery (CSRF) y realizar acciones arbitrarias en un dispositivo afectado. • http://www.securityfocus.com/bid/108858 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-csrf • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

A vulnerability in the Server Utilities of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to gain unauthorized access to sensitive user information from the configuration data that is stored on the affected system. The vulnerability is due to insufficient protection of data in the configuration file. An attacker could exploit this vulnerability by downloading the configuration file. An exploit could allow the attacker to use the sensitive information from the file to elevate privileges. Una vulnerabilidad en las Utilidades del Servidor de Integrated Management Controller (IMC) de Cisco, podría permitir a un atacante remoto autenticado lograr acceso no autorizado a información confidencial del usuario a partir de los datos de configuración almacenados en el sistema afectado. • http://www.securityfocus.com/bid/108847 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-infodiscl • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

A vulnerability in the web server of Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds checking. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. An exploit could allow the attacker to cause a buffer overflow, resulting in a process crash and DoS condition on the device. Una vulnerabilidad en el servidor web de Integrated Management Controller (IMC) de Cisco, podría permitir a un atacante local autenticado causar un desbordamiento del búfer, resultando en una condición de denegación de servicio (DoS) en un dispositivo afectado. • http://www.securityfocus.com/bid/108851 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-dos • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

A vulnerability in the configuration import utility of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to have write access and upload arbitrary data to the filesystem. The vulnerability is due to a failure to delete temporarily uploaded files. An attacker could exploit this vulnerability by crafting a malicious file and uploading it to the affected device. An exploit could allow the attacker to fill up the filesystem or upload malicious scripts. Una vulnerabilidad en la utilidad de importación de configuración de Integrated Management Controller (IMC) de Cisco, podría permitir a un atacante remoto no autenticado tener acceso de escritura y cargar datos arbitrarios al sistema de archivos. • http://www.securityfocus.com/bid/108852 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-filewrite • CWE-306: Missing Authentication for Critical Function •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

A vulnerability in the firmware signature checking program of Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient checking of an input buffer. An attacker could exploit this vulnerability by passing a crafted file to the affected system. A successful exploit could inhibit an administrator's ability to access the system. Una vulnerabilidad en el programa de comprobación de firmas del firmware de Integrated Management Controller (IMC) de Cisco, podría permitir a un atacante local autenticado causar un desbordamiento del búfer, resultando en una condición de denegación de servicio (DoS). • http://www.securityfocus.com/bid/108846 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-frmwr-dos • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •