Логотип exploitDog
bind:CVE-2018-0426
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-0426

Количество 3

Количество 3

nvd логотип

CVE-2018-0426

больше 7 лет назад

A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of directory traversal character sequences within the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to the targeted device. A successful exploit could allow the attacker to gain access to arbitrary files on the affected device, resulting in the disclosure of sensitive information.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-6fjh-4256-cjjm

больше 3 лет назад

A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of directory traversal character sequences within the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to the targeted device. A successful exploit could allow the attacker to gain access to arbitrary files on the affected device, resulting in the disclosure of sensitive information.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2018-01258

больше 7 лет назад

Уязвимость микропрограммного обеспечения веб-интерфейса управления брандмауэра Cisco RV110W Wireless-N VPN и многофункциональных VPN-маршрутизаторов Cisco RV130W Wireless-N и Cisco RV215W Wireless-N VPN, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-0426

A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of directory traversal character sequences within the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to the targeted device. A successful exploit could allow the attacker to gain access to arbitrary files on the affected device, resulting in the disclosure of sensitive information.

CVSS3: 9.8
10%
Низкий
больше 7 лет назад
github логотип
GHSA-6fjh-4256-cjjm

A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of directory traversal character sequences within the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to the targeted device. A successful exploit could allow the attacker to gain access to arbitrary files on the affected device, resulting in the disclosure of sensitive information.

CVSS3: 9.8
10%
Низкий
больше 3 лет назад
fstec логотип
BDU:2018-01258

Уязвимость микропрограммного обеспечения веб-интерфейса управления брандмауэра Cisco RV110W Wireless-N VPN и многофункциональных VPN-маршрутизаторов Cisco RV130W Wireless-N и Cisco RV215W Wireless-N VPN, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 6.5
10%
Низкий
больше 7 лет назад

Уязвимостей на страницу