Логотип exploitDog
bind:CVE-2019-16004
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-16004

Количество 3

Количество 3

nvd логотип

CVE-2019-16004

больше 5 лет назад

A vulnerability in the REST API endpoint of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to bypass authentication on an affected device. The vulnerability is due to missing authentication on some of the API calls. An attacker could exploit this vulnerability by sending a request to one of the affected calls. A successful exploit could allow the attacker to interact with some parts of the API.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-mg2f-7p87-hxwv

больше 3 лет назад

A vulnerability in the REST API endpoint of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to bypass authentication on an affected device. The vulnerability is due to missing authentication on some of the API calls. An attacker could exploit this vulnerability by sending a request to one of the affected calls. A successful exploit could allow the attacker to interact with some parts of the API.

EPSS: Низкий
fstec логотип

BDU:2020-00885

около 6 лет назад

Уязвимость реализации интерфейса REST API системы управления цифровым контентом Cisco Vision Dynamic Signage Director, позволяющая нарушителю получить доступ к некоторым частям программного интерфейса приложения

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-16004

A vulnerability in the REST API endpoint of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to bypass authentication on an affected device. The vulnerability is due to missing authentication on some of the API calls. An attacker could exploit this vulnerability by sending a request to one of the affected calls. A successful exploit could allow the attacker to interact with some parts of the API.

CVSS3: 6.5
0%
Низкий
больше 5 лет назад
github логотип
GHSA-mg2f-7p87-hxwv

A vulnerability in the REST API endpoint of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to bypass authentication on an affected device. The vulnerability is due to missing authentication on some of the API calls. An attacker could exploit this vulnerability by sending a request to one of the affected calls. A successful exploit could allow the attacker to interact with some parts of the API.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-00885

Уязвимость реализации интерфейса REST API системы управления цифровым контентом Cisco Vision Dynamic Signage Director, позволяющая нарушителю получить доступ к некоторым частям программного интерфейса приложения

CVSS3: 6.5
0%
Низкий
около 6 лет назад

Уязвимостей на страницу