Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xrvh-hj29-j7h9

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

/usr/local/cm/bin/pktCap_protectData in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 6, 7, and 8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in a request to the administrative interface, aka Bug IDs CSCti52041 and CSCti74930.

/usr/local/cm/bin/pktCap_protectData in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 6, 7, and 8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in a request to the administrative interface, aka Bug IDs CSCti52041 and CSCti74930.

EPSS

Процентиль: 85%
0.02623
Низкий

Дефекты

CWE-78

Связанные уязвимости

nvd
около 15 лет назад

/usr/local/cm/bin/pktCap_protectData in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 6, 7, and 8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in a request to the administrative interface, aka Bug IDs CSCti52041 and CSCti74930.

EPSS

Процентиль: 85%
0.02623
Низкий

Дефекты

CWE-78