Логотип exploitDog
bind:CVE-2020-3430
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3430

Количество 3

Количество 3

nvd логотип

CVE-2020-3430

больше 5 лет назад

A vulnerability in the application protocol handling features of Cisco Jabber for Windows could allow an unauthenticated, remote attacker to execute arbitrary commands. The vulnerability is due to improper handling of input to the application protocol handlers. An attacker could exploit this vulnerability by convincing a user to click a link within a message sent by email or other messaging platform. A successful exploit could allow the attacker to execute arbitrary commands on a targeted system with the privileges of the user account that is running the Cisco Jabber client software.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-hqr6-633p-3x2j

больше 3 лет назад

A vulnerability in the application protocol handling features of Cisco Jabber for Windows could allow an unauthenticated, remote attacker to execute arbitrary commands. The vulnerability is due to improper handling of input to the application protocol handlers. An attacker could exploit this vulnerability by convincing a user to click a link within a message sent by email or other messaging platform. A successful exploit could allow the attacker to execute arbitrary commands on a targeted system with the privileges of the user account that is running the Cisco Jabber client software.

EPSS: Низкий
fstec логотип

BDU:2020-04207

больше 5 лет назад

Уязвимость программной платформы Cisco Jabber Client Framework for Windows, связанная с неприятием мер по нейтрализации специальных элементов, используемых в команде ОС, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3430

A vulnerability in the application protocol handling features of Cisco Jabber for Windows could allow an unauthenticated, remote attacker to execute arbitrary commands. The vulnerability is due to improper handling of input to the application protocol handlers. An attacker could exploit this vulnerability by convincing a user to click a link within a message sent by email or other messaging platform. A successful exploit could allow the attacker to execute arbitrary commands on a targeted system with the privileges of the user account that is running the Cisco Jabber client software.

CVSS3: 8.8
5%
Низкий
больше 5 лет назад
github логотип
GHSA-hqr6-633p-3x2j

A vulnerability in the application protocol handling features of Cisco Jabber for Windows could allow an unauthenticated, remote attacker to execute arbitrary commands. The vulnerability is due to improper handling of input to the application protocol handlers. An attacker could exploit this vulnerability by convincing a user to click a link within a message sent by email or other messaging platform. A successful exploit could allow the attacker to execute arbitrary commands on a targeted system with the privileges of the user account that is running the Cisco Jabber client software.

5%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-04207

Уязвимость программной платформы Cisco Jabber Client Framework for Windows, связанная с неприятием мер по нейтрализации специальных элементов, используемых в команде ОС, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
5%
Низкий
больше 5 лет назад

Уязвимостей на страницу