CVE-2025-20346
- EPSS 0.04%
- Veröffentlicht 13.11.2025 16:27:30
- Zuletzt bearbeitet 19.11.2025 17:16:36
A vulnerability in Cisco Catalyst Center could allow an authenticated, remote attacker to execute operations that should require Administrator privileges. The attacker would need valid read-only user credentials. This vulnerability is due to impro...
CVE-2025-20349
- EPSS 0.29%
- Veröffentlicht 13.11.2025 16:18:03
- Zuletzt bearbeitet 19.11.2025 17:07:43
A vulnerability in the REST API of Cisco Catalyst Center could allow an authenticated, remote attacker to execute arbitrary commands in a restricted container as the root user. This vulnerability is due to insufficient validation of user-supplied ...
CVE-2025-20223
- EPSS 0.1%
- Veröffentlicht 07.05.2025 17:37:26
- Zuletzt bearbeitet 23.07.2025 14:53:16
A vulnerability in Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to read and modify data in a repository that belongs to an internal service of an affected device. This vulnerability is due to insu...
CVE-2025-20210
- EPSS 0.1%
- Veröffentlicht 07.05.2025 17:16:52
- Zuletzt bearbeitet 13.08.2025 19:05:32
A vulnerability in the management API of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to read and modify the outgoing proxy configuration settings. This vulnerability is due to the lack of authe...
CVE-2024-20333
- EPSS 0.17%
- Veröffentlicht 27.03.2024 17:15:53
- Zuletzt bearbeitet 23.07.2025 14:53:12
A vulnerability in the web-based management interface of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to change specific data within the interface on an affected device. This vulnerability is due ...
CVE-2023-20223
- EPSS 0.17%
- Veröffentlicht 27.09.2023 18:15:11
- Zuletzt bearbeitet 21.11.2024 07:40:56
A vulnerability in Cisco DNA Center could allow an unauthenticated, remote attacker to read and modify data in a repository that belongs to an internal service on an affected device. This vulnerability is due to insufficient access control enforce...
- EPSS 94.36%
- Veröffentlicht 10.12.2021 10:15:09
- Zuletzt bearbeitet 27.10.2025 17:40:33
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An atta...