Логотип exploitDog
bind:CVE-2019-15974
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-15974

Количество 3

Количество 3

nvd логотип

CVE-2019-15974

больше 5 лет назад

A vulnerability in the web interface of Cisco Managed Services Accelerator (MSX) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-qcwg-fv89-gmhm

больше 3 лет назад

A vulnerability in the web interface of Cisco Managed Services Accelerator (MSX) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.

EPSS: Низкий
fstec логотип

BDU:2020-00041

около 6 лет назад

Уязвимость веб-интерфейса платформы Cisco Managed Services Accelerator, связанная с недостаточной защитой WEB-страниц, позволяющая нарушителю перенаправлять пользователя на произвольный URL-адрес

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-15974

A vulnerability in the web interface of Cisco Managed Services Accelerator (MSX) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.

CVSS3: 6.1
0%
Низкий
больше 5 лет назад
github логотип
GHSA-qcwg-fv89-gmhm

A vulnerability in the web interface of Cisco Managed Services Accelerator (MSX) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-00041

Уязвимость веб-интерфейса платформы Cisco Managed Services Accelerator, связанная с недостаточной защитой WEB-страниц, позволяющая нарушителю перенаправлять пользователя на произвольный URL-адрес

CVSS3: 4.7
0%
Низкий
около 6 лет назад

Уязвимостей на страницу