Логотип exploitDog
bind:CVE-2019-12629
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-12629

Количество 3

Количество 3

nvd логотип

CVE-2019-12629

около 6 лет назад

A vulnerability in the WebUI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-r7cm-r8x5-rq3w

больше 3 лет назад

A vulnerability in the WebUI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system.

EPSS: Низкий
fstec логотип

BDU:2020-00412

около 6 лет назад

Уязвимость пользовательского интерфейса программно-определяемой сети Cisco SD-WAN, позволяющая нарушителю выполнять произвольные команды с привилегиями пользователя vmanage в уязвимой системе

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-12629

A vulnerability in the WebUI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system.

CVSS3: 7.2
1%
Низкий
около 6 лет назад
github логотип
GHSA-r7cm-r8x5-rq3w

A vulnerability in the WebUI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system.

1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-00412

Уязвимость пользовательского интерфейса программно-определяемой сети Cisco SD-WAN, позволяющая нарушителю выполнять произвольные команды с привилегиями пользователя vmanage в уязвимой системе

CVSS3: 4.7
1%
Низкий
около 6 лет назад

Уязвимостей на страницу