Логотип exploitDog
bind:CVE-2013-6180
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-6180

Количество 2

Количество 2

nvd логотип

CVE-2013-6180

около 12 лет назад

EMC RSA Security Analytics (SA) 10.x before 10.3, and RSA NetWitness NextGen 9.8, does not ensure that SA Core requests originate from the SA REST UI, which allows remote attackers to bypass intended access restrictions by sending a Core request from a web browser or other unintended user agent.

CVSS2: 6.8
EPSS: Низкий
github логотип

GHSA-rfgg-m2h5-727v

больше 3 лет назад

EMC RSA Security Analytics (SA) 10.x before 10.3, and RSA NetWitness NextGen 9.8, does not ensure that SA Core requests originate from the SA REST UI, which allows remote attackers to bypass intended access restrictions by sending a Core request from a web browser or other unintended user agent.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2013-6180

EMC RSA Security Analytics (SA) 10.x before 10.3, and RSA NetWitness NextGen 9.8, does not ensure that SA Core requests originate from the SA REST UI, which allows remote attackers to bypass intended access restrictions by sending a Core request from a web browser or other unintended user agent.

CVSS2: 6.8
0%
Низкий
около 12 лет назад
github логотип
GHSA-rfgg-m2h5-727v

EMC RSA Security Analytics (SA) 10.x before 10.3, and RSA NetWitness NextGen 9.8, does not ensure that SA Core requests originate from the SA REST UI, which allows remote attackers to bypass intended access restrictions by sending a Core request from a web browser or other unintended user agent.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу