Логотип exploitDog
bind:CVE-2018-0420
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-0420

Количество 3

Количество 3

nvd логотип

CVE-2018-0420

больше 7 лет назад

A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames and pathnames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files on the targeted device, which may contain sensitive information.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-5wmr-q26h-9p6x

больше 3 лет назад

A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames and pathnames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files on the targeted device, which may contain sensitive information.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2019-00080

больше 7 лет назад

Уязвимость веб-интерфейса контроллера беспроводного доступа Cisco Wireless LAN Controller, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-0420

A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames and pathnames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files on the targeted device, which may contain sensitive information.

CVSS3: 6.5
3%
Низкий
больше 7 лет назад
github логотип
GHSA-5wmr-q26h-9p6x

A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames and pathnames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files on the targeted device, which may contain sensitive information.

CVSS3: 6.5
3%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-00080

Уязвимость веб-интерфейса контроллера беспроводного доступа Cisco Wireless LAN Controller, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 6.5
3%
Низкий
больше 7 лет назад

Уязвимостей на страницу