Cisco UCS Director JavaScript Cross-Site Scripting Vulnerability

<p>A vulnerability in the web applications of Cisco&nbsp;UCS Director could allow an authenticated, remote attacker to <span class=”TextRun Highlight SCXO16456276 BCX2″><span class=”NormalTextRun SCXO16456276 BCX2″>conduct a cross-site scripting attack on an affected system.</span></span></p>
<p>This vulnerability is due to unsanitized user input. An attacker could exploit this vulnerability by submitting custom JavaScript to affected web applications. A successful exploit could allow the attacker to rewrite web page content, access sensitive information stored in the applications, and alter data by submitting forms.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href=”″ target=”_blank”></a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20765


  • No Related Posts

Leave a Reply