Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3737-4gjf-cp7r

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Cisco Wireless Control System (WCS) before 4.0.96.0 has a hard-coded FTP username and password for backup operations, which allows remote attackers to read and modify arbitrary files via unspecified vectors related to "properties of the FTP server," aka Bug ID CSCse93014.

Cisco Wireless Control System (WCS) before 4.0.96.0 has a hard-coded FTP username and password for backup operations, which allows remote attackers to read and modify arbitrary files via unspecified vectors related to "properties of the FTP server," aka Bug ID CSCse93014.

EPSS

Процентиль: 78%
0.01155
Низкий

Связанные уязвимости

nvd
почти 19 лет назад

Cisco Wireless Control System (WCS) before 4.0.96.0 has a hard-coded FTP username and password for backup operations, which allows remote attackers to read and modify arbitrary files via unspecified vectors related to "properties of the FTP server," aka Bug ID CSCse93014.

EPSS

Процентиль: 78%
0.01155
Низкий