6 results (0.004 seconds)

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 0

Cisco Context Directory Agent (CDA) allows remote authenticated users to trigger the omission of certain user-interface data via crafted field values, aka Bug ID CSCuj45353. Cisco Context Directory Agent (CDA) permite a los usuarios remotos autenticados desencadenar la omisión de ciertos datos de la interfaz de usuario a través de los valores de campo manipulados, también conocido como Bug ID CSCuj45353. • http://osvdb.org/101801 http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0656 http://www.securityfocus.com/bid/64701 http://www.securitytracker.com/id/1029569 https://exchange.xforce.ibmcloud.com/vulnerabilities/90169 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cisco Context Directory Agent (CDA) allows remote attackers to modify the cache via a replay attack involving crafted RADIUS accounting messages, aka Bug ID CSCuj45383. Cisco Context Directory Agent (CDA) permite a atacantes remotos modificar la cache a través de un ataque replay que involucra mensajes RADIUS manipulados, tambien conocido como Bug ID CSCuj45383. • http://osvdb.org/101802 http://secunia.com/advisories/56365 http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0654 http://tools.cisco.com/security/center/viewAlert.x?alertId=32366 http://www.securityfocus.com/bid/64709 http://www.securitytracker.com/id/1029574 https://exchange.xforce.ibmcloud.com/vulnerabilities/90168 • CWE-20: Improper Input Validation •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

The administrative interface in Cisco Context Directory Agent (CDA) does not properly enforce authorization requirements, which allows remote authenticated users to obtain administrative access by hijacking a session, aka Bug ID CSCuj45347. El interfaz administrativo en Cisco Context Directory Agent (CDA) no fuerza apropiadamente los requisitos de autenticación, lo que permite a usuarios autenticados obtener acceso administrativo secuestrando una sesión, tambien conocido como Bug ID CSCuj45347. • http://osvdb.org/101809 http://secunia.com/advisories/56365 http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0651 http://tools.cisco.com/security/center/viewAlert.x?alertId=32364 http://www.securityfocus.com/bid/64706 http://www.securitytracker.com/id/1029573 https://exchange.xforce.ibmcloud.com/vulnerabilities/90166 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the Mappings page in Cisco Context Directory Agent (CDA) allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuj45358. Vulnerabilidad cross-site scripting (XSS) en la página Mappings de Cisco Context Directory Agent (CDA) per4mite a atacantes remotos inyectar script web o HTML de forma arbitraria a través de una URL manipulada, tambien conocido como Bug ID CSCuj45358. • http://osvdb.org/101803 http://secunia.com/advisories/56365 http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0652 http://tools.cisco.com/security/center/viewAlert.x?alertId=32365 http://www.securityfocus.com/bid/64703 http://www.securitytracker.com/id/1029572 https://exchange.xforce.ibmcloud.com/vulnerabilities/90167 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 11EXPL: 0

The command-line interface in Cisco Secure Access Control System (ACS), Identity Services Engine Software, Context Directory Agent, Application Networking Manager (ANM), Prime Network Control System, Prime LAN Management Solution (LMS), Prime Collaboration, Unified Provisioning Manager, Network Services Manager, Prime Data Center Network Manager (DCNM), and Quad does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCug29384, CSCug13866, CSCug29400, CSCug29406, CSCug29411, CSCug29413, CSCug29416, CSCug29418, CSCug29422, CSCug29425, and CSCug29426, a different issue than CVE-2013-1125. La interfaz de línea de comandos en el sistema Cisco Secure Access Control (ACS), Servicios de Identidad del motor de software, Agente de Directorio Contexto, Gerente de Redes de Aplicaciones (ANM), Sistema de Control de Red Prime, LAN Management Solution Prime (LMS), Prime Collaboration, Provisioning Manager Unificado , Network Services Manager, el primer Data Center Network Manager (DCNM) y Quad no validan correctamente la entrada, lo que permite a usuarios locales obtener privilegios de root a través de vectores no especificados. Vulnerabilidad también conocida como Bug ID CSCug29384, CSCug13866, CSCug29400, CSCug29406, CSCug29411, CSCug29413, CSCug29416 , CSCug29418, CSCug29422, CSCug29425 y CSCug29426. Se trata de una cuestión diferente que CVE-2013-1125. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1196 • CWE-20: Improper Input Validation •