cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2016-1297,https://securityvulnerability.io/vulnerability/CVE-2016-1297,,"The Device Manager GUI in Cisco Application Control Engine (ACE) 4710 A5 before A5(3.1) allows remote authenticated users to bypass intended RBAC restrictions and execute arbitrary CLI commands with admin privileges via an unspecified parameter in a POST request, aka Bug ID CSCul84801.",Cisco,Application Control Engine Software,8.8,HIGH,0.002630000002682209,false,,false,false,false,,,false,false,,2016-02-26T02:00:00.000Z,0 CVE-2013-1196,https://securityvulnerability.io/vulnerability/CVE-2013-1196,,"The command-line interface in Cisco Secure Access Control System (ACS), Identity Services Engine Software, Context Directory Agent, Application Networking Manager (ANM), Prime Network Control System, Prime LAN Management Solution (LMS), Prime Collaboration, Unified Provisioning Manager, Network Services Manager, Prime Data Center Network Manager (DCNM), and Quad does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCug29384, CSCug13866, CSCug29400, CSCug29406, CSCug29411, CSCug29413, CSCug29416, CSCug29418, CSCug29422, CSCug29425, and CSCug29426, a different issue than CVE-2013-1125.",Cisco,"Prime Network Control System,Secure Access Control System,Prime Collaboration,Prime Data Center Network Manager,Network Services Manager,Application Networking Manager,Quad,Context Directory Agent,Unified Provisioning Manager,Prime Lan Management Solution,Identity Services Engine Software",,,0.0012400000123307109,false,,false,false,false,,,false,false,,2013-04-29T21:55:00.000Z,0 CVE-2013-1125,https://securityvulnerability.io/vulnerability/CVE-2013-1125,,"The command-line interface in Cisco Identity Services Engine Software, Secure Access Control System (ACS), Application Networking Manager (ANM), Prime LAN Management Solution (LMS), Prime Network Control System, Quad, Context Directory Agent, Prime Collaboration, Unified Provisioning Manager, and Network Services Manager does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCue46001, CSCud95790, CSCue46021, CSCue46025, CSCue46023, CSCue46058, CSCue46013, CSCue46031, CSCue46035, and CSCue46042.",Cisco,"Prime Network Control System,Secure Access Control System,Prime Collaboration,Network Services Manager,Application Networking Manager,Quad,Context Directory Agent,Unified Provisioning Manager,Prime Lan Management Solution,Identity Services Engine Software",,,0.0006399999838322401,false,,false,false,false,,,false,false,,2013-02-19T23:55:00.000Z,0 CVE-2012-3063,https://securityvulnerability.io/vulnerability/CVE-2012-3063,,"Cisco Application Control Engine (ACE) before A4(2.3) and A5 before A5(1.1), when multicontext mode is enabled, does not properly share a management IP address among multiple contexts, which allows remote authenticated administrators to bypass intended access restrictions in opportunistic circumstances, and read or modify configuration settings, via a login attempt to a context, aka Bug ID CSCts30631, a different vulnerability than CVE-2012-3058.",Cisco,Application Control Engine Software,,,0.0013899999903514981,false,,false,false,false,,,false,false,,2012-06-20T20:00:00.000Z,0