cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-20280,https://securityvulnerability.io/vulnerability/CVE-2024-20280,Cisco UCS Central Software Vulnerability: Sensitive Information at Risk,"A vulnerability in the backup feature of Cisco UCS Central Software could allow an attacker with access to a backup file to learn sensitive information that is stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method that is used for the backup function. An attacker could exploit this vulnerability by accessing a backup file and leveraging a static key that is used for the backup configuration feature. A successful exploit could allow an attacker with access to a backup file to learn sensitive information that is stored in full state backup files and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and the device SSL server certificate and key.",Cisco,Cisco Unified Computing System Central Software,6.3,MEDIUM,0.0004299999854993075,false,,false,false,true,2024-10-31T15:15:05.000Z,,false,false,,2024-10-16T17:15:00.000Z,0 CVE-2021-1354,https://securityvulnerability.io/vulnerability/CVE-2021-1354,Cisco Unified Computing System Central Software Improper Certificate Validation Vulnerability,"A vulnerability in the certificate registration process of Cisco Unified Computing System (UCS) Central Software could allow an authenticated, adjacent attacker to register a rogue Cisco Unified Computing System Manager (UCSM). This vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to the registration API. A successful exploit could allow the attacker to register a rogue Cisco UCSM and gain access to Cisco UCS Central Software data and Cisco UCSM inventory data.",Cisco,Cisco Unified Computing System Central Software,4.3,MEDIUM,0.0004400000034365803,false,,false,false,true,2024-08-03T17:15:52.000Z,,false,false,,2021-02-04T17:15:00.000Z,0 CVE-2016-1401,https://securityvulnerability.io/vulnerability/CVE-2016-1401,,"Cross-site scripting (XSS) vulnerability in the management interface in Cisco Unified Computing System (UCS) Central Software 1.4(1a) allows remote attackers to inject arbitrary web script or HTML via a crafted value, aka Bug ID CSCuy91250.",Cisco,Unified Computing System Central Software,6.1,MEDIUM,0.0012499999720603228,false,,false,false,false,,,false,false,,2016-05-21T01:00:00.000Z,0 CVE-2016-1352,https://securityvulnerability.io/vulnerability/CVE-2016-1352,,"Cisco Unified Computing System (UCS) Central Software 1.3(1b) and earlier allows remote attackers to execute arbitrary OS commands via a crafted HTTP request, aka Bug ID CSCuv33856.",Cisco,Unified Computing System Central Software,9.8,CRITICAL,0.0015899999998509884,false,,false,false,false,,,false,false,,2016-04-14T01:00:00.000Z,0 CVE-2015-6387,https://securityvulnerability.io/vulnerability/CVE-2015-6387,,"Cross-site scripting (XSS) vulnerability in Cisco Unified Computing System (UCS) Central Software 1.3(0.1) allows remote attackers to inject arbitrary web script or HTML via a crafted value in a URL, aka Bug ID CSCux33573.",Cisco,Unified Computing System Central Software,,,0.0013500000350177288,false,,false,false,false,,,false,false,,2015-12-05T02:00:00.000Z,0 CVE-2015-6388,https://securityvulnerability.io/vulnerability/CVE-2015-6388,,"Cisco Unified Computing System (UCS) Central software 1.3(0.1) allows remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted request, aka Bug ID CSCux33575.",Cisco,Unified Computing System Central Software,,,0.0029200001154094934,false,,false,false,false,,,false,false,,2015-12-05T02:00:00.000Z,0 CVE-2015-4286,https://securityvulnerability.io/vulnerability/CVE-2015-4286,,"The web framework in Cisco UCS Central Software 1.3(0.99) allows remote attackers to read arbitrary files via a crafted HTTP request, aka Bug ID CSCuu41377.",Cisco,Unified Computing System Central Software,,,0.0009599999757483602,false,,false,false,false,,,false,false,,2015-07-29T14:00:00.000Z,0 CVE-2015-0701,https://securityvulnerability.io/vulnerability/CVE-2015-0701,,"Cisco UCS Central Software before 1.3(1a) allows remote attackers to execute arbitrary commands via a crafted HTTP request, aka Bug ID CSCut46961.",Cisco,Unified Computing System Central Software,,,0.0038900000508874655,false,,false,false,false,,,false,false,,2015-05-07T01:00:00.000Z,0 CVE-2014-0730,https://securityvulnerability.io/vulnerability/CVE-2014-0730,,"Cisco Unified Computing System (UCS) Central Software 1.1 and earlier allows local users to gain privileges via a CLI copy command in a local-mgmt context, aka Bug ID CSCul53128.",Cisco,Unified Computing System Central Software,,,0.0006000000284984708,false,,false,false,false,,,false,false,,2014-02-22T21:00:00.000Z,0