Known Vulnerabilities for Application Policy Infrastructure Controller Enterprise Module by Cisco

Listed below are 8 of the newest known vulnerabilities associated with "Application Policy Infrastructure Controller Enterprise Module" by "Cisco".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2018-0427 json A vulnerability in the CronJob scheduler API of Cisco Digital Network Architecture (DNA) Center could allow an authenticated,... 8.8 - HIGH 2018-08-15 2020-08-31
CVE-2018-0368 json A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an authenticated, local attacker to access sen... 7.8 - HIGH 2018-07-16 2019-10-09
CVE-2017-12262 json A vulnerability within the firewall configuration of the Cisco Application Policy Infrastructure Controller Enterprise Module... 8.8 - HIGH 2017-11-02 2019-10-09
CVE-2016-1386 json The API in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.0(1) allows remote attackers to s... 7.5 - HIGH 2016-04-28 2016-12-03
CVE-2016-1365 json The Grapevine update process in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.0 allows rem... 8.8 - HIGH 2016-08-18 2017-08-16
CVE-2016-1318 json Cross-site scripting (XSS) vulnerability in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.... 6.1 - MEDIUM 2016-02-09 2016-12-06
CVE-2016-1305 json Cross-site scripting (XSS) vulnerability in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.... 6.1 - MEDIUM 2016-02-07 2016-12-06
CVE-2015-6337 json Cross-site scripting (XSS) vulnerability in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.... 6.1 - MEDIUM 2016-01-26 2016-12-07

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.6.4
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.6.3
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.6.2
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.4.2.1045
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.4.1.1159
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.4.0.1959
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.3.3.126
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.3.2.37
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.3.1.9
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.3.0.4383
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.2.1.691
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.2.1.686
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.2.0.1594
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.1_base
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.1.2.15
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.1.1.38
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.1.1.34
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.1.0.767
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.0_ga
ApplicationCiscoApplication Policy Infrastructure Controller Enterprise Module1.0.\(1\)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report