Логотип exploitDog
bind:CVE-2025-20116
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-20116

Количество 3

Количество 3

nvd логотип

CVE-2025-20116

12 месяцев назад

A vulnerability in the web UI of Cisco APIC could allow an authenticated, remote attacker to perform a stored XSS attack on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by injecting malicious code into specific pages of the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web UI or access sensitive, browser-based information.

CVSS3: 4.8
EPSS: Низкий
github логотип

GHSA-7hc3-j2x7-vm7q

12 месяцев назад

A vulnerability in the web UI of Cisco APIC could allow an authenticated, remote attacker to perform a stored XSS attack on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by injecting malicious code into specific pages of the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web UI or access sensitive, browser-based information.

CVSS3: 4.8
EPSS: Низкий
fstec логотип

BDU:2025-05652

12 месяцев назад

Уязвимость веб-интерфейса средства управления информационной инфраструктурой Cisco Application Policy Infrastructure Controller, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)

CVSS3: 4.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-20116

A vulnerability in the web UI of Cisco APIC could allow an authenticated, remote attacker to perform a stored XSS attack on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by injecting malicious code into specific pages of the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web UI or access sensitive, browser-based information.

CVSS3: 4.8
0%
Низкий
12 месяцев назад
github логотип
GHSA-7hc3-j2x7-vm7q

A vulnerability in the web UI of Cisco APIC could allow an authenticated, remote attacker to perform a stored XSS attack on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by injecting malicious code into specific pages of the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web UI or access sensitive, browser-based information.

CVSS3: 4.8
0%
Низкий
12 месяцев назад
fstec логотип
BDU:2025-05652

Уязвимость веб-интерфейса средства управления информационной инфраструктурой Cisco Application Policy Infrastructure Controller, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)

CVSS3: 4.8
0%
Низкий
12 месяцев назад

Уязвимостей на страницу