cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2017-12225,https://securityvulnerability.io/vulnerability/CVE-2017-12225,,"A vulnerability in the web functionality of the Cisco Prime LAN Management Solution could allow an authenticated, remote attacker to hijack another user's administrative session, aka a Session Fixation Vulnerability. The vulnerability is due to the reuse of a preauthentication session token as part of the postauthentication session. An attacker could exploit this vulnerability by obtaining the presession token ID. An exploit could allow an attacker to hijack an existing user's session. Known Affected Releases 4.2(5). Cisco Bug IDs: CSCvf58392.",Cisco,Cisco Prime Lan Management Solution,6.5,MEDIUM,0.002199999988079071,false,,false,false,false,,,false,false,,2017-09-07T21:00:00.000Z,0 CVE-2016-1360,https://securityvulnerability.io/vulnerability/CVE-2016-1360,,"Cisco Prime LAN Management Solution (LMS) through 4.2.5 uses the same database decryption key across different customers' installations, which allows local users to obtain cleartext data by leveraging console connectivity, aka Bug ID CSCuw85390.",Cisco,Prime Lan Management Solution,7.1,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2016-03-12T02:00:00.000Z,0 CVE-2015-0594,https://securityvulnerability.io/vulnerability/CVE-2015-0594,,"Multiple cross-site scripting (XSS) vulnerabilities in the help pages in Cisco Common Services, as used in Cisco Prime LAN Management Solution (LMS) and Cisco Security Manager, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCuq54654 and CSCun18263.",Cisco,"Security Manager,Prime Lan Management Solution",,,0.002199999988079071,false,,false,false,false,,,false,false,,2015-02-27T02:00:00.000Z,0 CVE-2013-5482,https://securityvulnerability.io/vulnerability/CVE-2013-5482,,"Cisco Prime LAN Management Solution (LMS) does not properly restrict use of IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks and unspecified other attacks via a crafted web site, related to a ""cross-frame scripting (XFS)"" issue, aka Bug ID CSCug77823.",Cisco,Prime Lan Management Solution,,,0.0013099999632686377,false,,false,false,false,,,false,false,,2013-09-13T14:10:00.000Z,0 CVE-2013-5488,https://securityvulnerability.io/vulnerability/CVE-2013-5488,,"Cisco Common Services, as used in Cisco Prime LAN Management Solution (LMS), Cisco Security Manager, Cisco Unified Service Monitor, and Cisco Unified Operations Manager, does not properly interact with the ActiveMQ component, which allows remote attackers to cause a denial of service (memory consumption) via simultaneous TCP sessions, aka Bug IDs CSCuh54766, CSCuh01267, CSCuh95976, and CSCuh95969.",Cisco,"Unified Service Monitor,Unified Operations Manager,Security Manager,Prime Lan Management Solution",,,0.00675999978557229,false,,false,false,false,,,false,false,,2013-09-12T01:00:00.000Z,0 CVE-2013-1196,https://securityvulnerability.io/vulnerability/CVE-2013-1196,,"The command-line interface in Cisco Secure Access Control System (ACS), Identity Services Engine Software, Context Directory Agent, Application Networking Manager (ANM), Prime Network Control System, Prime LAN Management Solution (LMS), Prime Collaboration, Unified Provisioning Manager, Network Services Manager, Prime Data Center Network Manager (DCNM), and Quad does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCug29384, CSCug13866, CSCug29400, CSCug29406, CSCug29411, CSCug29413, CSCug29416, CSCug29418, CSCug29422, CSCug29425, and CSCug29426, a different issue than CVE-2013-1125.",Cisco,"Prime Network Control System,Secure Access Control System,Prime Collaboration,Prime Data Center Network Manager,Network Services Manager,Application Networking Manager,Quad,Context Directory Agent,Unified Provisioning Manager,Prime Lan Management Solution,Identity Services Engine Software",,,0.0012400000123307109,false,,false,false,false,,,false,false,,2013-04-29T21:55:00.000Z,0 CVE-2013-1125,https://securityvulnerability.io/vulnerability/CVE-2013-1125,,"The command-line interface in Cisco Identity Services Engine Software, Secure Access Control System (ACS), Application Networking Manager (ANM), Prime LAN Management Solution (LMS), Prime Network Control System, Quad, Context Directory Agent, Prime Collaboration, Unified Provisioning Manager, and Network Services Manager does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCue46001, CSCud95790, CSCue46021, CSCue46025, CSCue46023, CSCue46058, CSCue46013, CSCue46031, CSCue46035, and CSCue46042.",Cisco,"Prime Network Control System,Secure Access Control System,Prime Collaboration,Network Services Manager,Application Networking Manager,Quad,Context Directory Agent,Unified Provisioning Manager,Prime Lan Management Solution,Identity Services Engine Software",,,0.0006399999838322401,false,,false,false,false,,,false,false,,2013-02-19T23:55:00.000Z,0 CVE-2012-6392,https://securityvulnerability.io/vulnerability/CVE-2012-6392,,"Cisco Prime LAN Management Solution (LMS) 4.1 through 4.2.2 on Linux does not properly validate authentication and authorization requests in TCP sessions, which allows remote attackers to execute arbitrary commands via a crafted session, aka Bug ID CSCuc79779.",Cisco,Prime Lan Management Solution,,,0.14112000167369843,false,,false,false,false,,,false,false,,2013-01-17T15:55:00.000Z,0