Cisco released security updates for Data Center Network Manager that allows an unauthenticated, remote attacker to upload arbitrary files on an affected device.
The vulnerability resides in the web-based management interface of DCNM that allows an unauthenticated, remote attacker to upload arbitrary code on the affected device.
A remote attacker could exploit the vulnerability by uploading specially crafted data, and the vulnerability is due to incorrect permission settings.
Cisco has released updates to address this vulnerability; you can find the advisory here.
The vulnerability is due to improper session management; it allows a remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device.
Cisco has released updates to address this vulnerability; you can find the advisory here.
The vulnerability resides in the web-based management interface of the Cisco Data Center Network Manager allows an attacker to gain access to sensitive files on an affected device.
Successful exploitation of the vulnerability allows an attacker to arbitrary files from the underlying filesystem of the affected device. The vulnerability is due to lack of permission settings.
Cisco has released updates to address this vulnerability; you can find the advisory here.
A vulnerability in the web interface allows a remote attacker to retrieve sensitive information from an affected device. The vulnerability is due to lack of improper access controls for specific URLs on the affected device.
Cisco has released updates to address this vulnerability; you can find the advisory here.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.
Memory Corruption Flaw in macOS Let Hackers run Malicious Code with Root Privileges
macOS Zero-Day Vulnerability Allows Hackers to Bypass Security Protections With Synthetic Clicks
Some router models have identified a security vulnerability that allows attackers to bypass authentication. To exploit this vulnerability, an attacker…
Hackers often target CrushFTP servers as they contain sensitive data and are used for file sharing and storage. This makes…
DDoS attacks are a significant and growing risk that can overpower websites, crash servers, and block out authorized users with…
Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt Strike Beacon, targeting systems in Ukraine.…
In a historic move, Microsoft has made the source code for MS-DOS 4.0, one of the most influential operating systems…
A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which utilized SSLoad malware for its operations…