Added |
CVSS V3.1 |
|
NIST AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
Added |
CVSS V2 |
|
NIST (AV:N/AC:L/Au:S/C:C/I:C/A:C)
|
Added |
CWE |
|
NIST CWE-22
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:a:cisco:ucs_director:6.0.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.0.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.0.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.0.1.1:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.0.1.2:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.0.1.3:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.5.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.5.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.5.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.5.0.3:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.5.0.4:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.6.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.6.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.6.2.0:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.7.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.7.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.7.2.0:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director:6.7.3.0:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:ucs_director_express_for_big_data:*:*:*:*:*:*:*:* versions up to (including) 3.7.3.0
|
Changed |
Reference Type |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E No Types Assigned
|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E Vendor Advisory
|
Changed |
Reference Type |
https://www.zerodayinitiative.com/advisories/ZDI-20-539/ No Types Assigned
|
https://www.zerodayinitiative.com/advisories/ZDI-20-539/ Third Party Advisory, VDB Entry
|