Page 9 of 49 results (0.031 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cisco Prime Infrastructure 2.2(2) does not properly restrict use of IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks and unspecified other attacks via a crafted web site, related to a "cross-frame scripting (XFS)" issue, aka Bug ID CSCuw65846, a different vulnerability than CVE-2015-6434. Cisco Prime Infrastructure 2.2(2) no restingue adecuadamente uso de elementos IFRAME, lo que facilita a atacantes remotos llevar a cabo ataques clickjacking y otros ataques no especificados a través de un sitio web manipulado, relacionado con un problema "cross-frame scripting (XFS)", también conocido como Bug ID CSCuw65846, una vulnerabilidad diferente a CVE-2015-6434. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-cpi http://www.securityfocus.com/bid/92278 http://www.securitytracker.com/id/1036530 • CWE-284: Improper Access Control •

CVSS: 10.0EPSS: 1%CPEs: 14EXPL: 0

The API in Cisco Prime Infrastructure 1.2 through 3.0 and Evolved Programmable Network Manager (EPNM) 1.2 allows remote attackers to execute arbitrary code or obtain sensitive management information via a crafted HTTP request, as demonstrated by discovering managed-device credentials, aka Bug ID CSCuy10231. La API en Cisco Prime Infrastructure 1.2 hasta la versión 3.0 y Evolved Programmable Network Manager (EPNM) 1.2 permite a atacantes remotos ejecutar código arbitrario u obtener información de gestión sensible a través de una petición HTTP manipulada, según lo demostrado mediante el descubrimiento de credenciales de dispositivos gestionados, también conocido como Bug ID CSCuy10231. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-piauthbypass http://www.securityfocus.com/bid/91504 http://www.securitytracker.com/id/1036195 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.8EPSS: 0%CPEs: 21EXPL: 0

Cisco Prime Infrastructure 1.2 through 3.1 and Evolved Programmable Network Manager (EPNM) 1.2 and 2.0 allow remote authenticated users to execute arbitrary commands or upload files via a crafted HTTP request, aka Bug ID CSCuz01488. Cisco Prime Infrastructure 1.2 hasta la versión 3.1 y Evolved Programmable Network Manager (EPNM) 1.2 y 2.0 permite a usuarios remotos autenticado ejecutar comandos arbitrarios o subir archivos a través de una petición HTTP manipulada, también conocida como Bug ID CSCuz01488. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-pi-epnm http://www.securityfocus.com/bid/91506 http://www.securitytracker.com/id/1036197 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 0%CPEs: 18EXPL: 0

The API web interface in Cisco Prime Infrastructure before 3.1 and Cisco Evolved Programmable Network Manager before 1.2.4 allows remote authenticated users to bypass intended RBAC restrictions and obtain sensitive information, and consequently gain privileges, via crafted JSON data, aka Bug ID CSCuy12409. La interfaz web API en Cisco Prime Infrastructure en versiones anteriores a 3.1 y Cisco Evolved Programmable Network Manager en versiones anteriores a 1.2.4 permite a usuarios remotos autenticados eludir restricciones destinadas al RBAC y obtener información sensible, y consecuentemente obtener privilegios, a través de datos JSON manipulados, también conocida como Bug ID CSCuy12409. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160523-pi-epnm http://www.securitytracker.com/id/1035948 • CWE-284: Improper Access Control •

CVSS: 8.1EPSS: 0%CPEs: 14EXPL: 0

The web API in Cisco Prime Infrastructure 1.2.0 through 2.2(2) and Cisco Evolved Programmable Network Manager (EPNM) 1.2 allows remote authenticated users to bypass intended RBAC restrictions and gain privileges via an HTTP request that is inconsistent with a pattern filter, aka Bug ID CSCuy10227. La API web en Cisco Prime Infrastructure 1.2.0 hasta la versión 2.2(2) y Cisco Evolved Programmable Network Manager (EPNM) 1.2 permite a usuarios remotos autenticados eludir restricciones RBAC previstas y obtener privilegios a través de una petición HTTP que es inconsistente con un patrón de filtro, también conocido como Bug ID CSCuy10227. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-privauth http://www.securitytracker.com/id/1035498 • CWE-264: Permissions, Privileges, and Access Controls •