Количество 3
Количество 3
CVE-2022-20765
A vulnerability in the web applications of Cisco UCS Director could allow an authenticated, remote attacker to conduct a cross-site scripting attack on an affected system. This vulnerability is due to unsanitized user input. An attacker could exploit this vulnerability by submitting custom JavaScript to affected web applications. A successful exploit could allow the attacker to rewrite web page content, access sensitive information stored in the applications, and alter data by submitting forms.
GHSA-385g-388p-m6hv
A vulnerability in the web applications of Cisco UCS Director could allow an authenticated, remote attacker to conduct a cross-site scripting attack on an affected system. This vulnerability is due to unsanitized user input. An attacker could exploit this vulnerability by submitting custom JavaScript to affected web applications. A successful exploit could allow the attacker to rewrite web page content, access sensitive information stored in the applications, and alter data by submitting forms.
BDU:2022-04547
Уязвимость веб-интерфейса управления средства управления физической инфраструктурой и виртуальными средами Cisco UCS Director, позволяющая нарушителю осуществить межсайтовые сценарные атаки
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-20765 A vulnerability in the web applications of Cisco UCS Director could allow an authenticated, remote attacker to conduct a cross-site scripting attack on an affected system. This vulnerability is due to unsanitized user input. An attacker could exploit this vulnerability by submitting custom JavaScript to affected web applications. A successful exploit could allow the attacker to rewrite web page content, access sensitive information stored in the applications, and alter data by submitting forms. | CVSS3: 4.8 | 0% Низкий | больше 3 лет назад | |
GHSA-385g-388p-m6hv A vulnerability in the web applications of Cisco UCS Director could allow an authenticated, remote attacker to conduct a cross-site scripting attack on an affected system. This vulnerability is due to unsanitized user input. An attacker could exploit this vulnerability by submitting custom JavaScript to affected web applications. A successful exploit could allow the attacker to rewrite web page content, access sensitive information stored in the applications, and alter data by submitting forms. | CVSS3: 4.8 | 0% Низкий | больше 3 лет назад | |
BDU:2022-04547 Уязвимость веб-интерфейса управления средства управления физической инфраструктурой и виртуальными средами Cisco UCS Director, позволяющая нарушителю осуществить межсайтовые сценарные атаки | CVSS3: 4.8 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу