Логотип exploitDog
bind:CVE-2014-0666
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-0666

Количество 2

Количество 2

nvd логотип

CVE-2014-0666

около 12 лет назад

Directory traversal vulnerability in the Send Screen Capture implementation in Cisco Jabber 9.2(.1) and earlier on Windows allows remote attackers to upload arbitrary types of files, and consequently execute arbitrary code, via modified packets, aka Bug ID CSCug48056.

CVSS2: 4.3
EPSS: Средний
github логотип

GHSA-75rf-hx73-vjfr

больше 3 лет назад

Directory traversal vulnerability in the Send Screen Capture implementation in Cisco Jabber 9.2(.1) and earlier on Windows allows remote attackers to upload arbitrary types of files, and consequently execute arbitrary code, via modified packets, aka Bug ID CSCug48056.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2014-0666

Directory traversal vulnerability in the Send Screen Capture implementation in Cisco Jabber 9.2(.1) and earlier on Windows allows remote attackers to upload arbitrary types of files, and consequently execute arbitrary code, via modified packets, aka Bug ID CSCug48056.

CVSS2: 4.3
10%
Средний
около 12 лет назад
github логотип
GHSA-75rf-hx73-vjfr

Directory traversal vulnerability in the Send Screen Capture implementation in Cisco Jabber 9.2(.1) and earlier on Windows allows remote attackers to upload arbitrary types of files, and consequently execute arbitrary code, via modified packets, aka Bug ID CSCug48056.

10%
Средний
больше 3 лет назад

Уязвимостей на страницу