Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7pm6-cf6j-6prc

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The JAR files on Cisco Device Manager for Cisco MDS 9000 devices before 5.2.8, and Cisco Device Manager for Cisco Nexus 5000 devices, allow remote attackers to execute arbitrary commands on Windows client machines via a crafted element-manager.jnlp file, aka Bug IDs CSCty17417 and CSCty10802.

The JAR files on Cisco Device Manager for Cisco MDS 9000 devices before 5.2.8, and Cisco Device Manager for Cisco Nexus 5000 devices, allow remote attackers to execute arbitrary commands on Windows client machines via a crafted element-manager.jnlp file, aka Bug IDs CSCty17417 and CSCty10802.

EPSS

Процентиль: 74%
0.00815
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
почти 13 лет назад

The JAR files on Cisco Device Manager for Cisco MDS 9000 devices before 5.2.8, and Cisco Device Manager for Cisco Nexus 5000 devices, allow remote attackers to execute arbitrary commands on Windows client machines via a crafted element-manager.jnlp file, aka Bug IDs CSCty17417 and CSCty10802.

EPSS

Процентиль: 74%
0.00815
Низкий

Дефекты

CWE-20