Логотип exploitDog
bind:CVE-2019-1794
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1794

Количество 3

Количество 3

nvd логотип

CVE-2019-1794

почти 7 лет назад

A vulnerability in the search path processing of Cisco Directory Connector could allow an authenticated, local attacker to load a binary of their choosing. The vulnerability is due to uncontrolled search path elements. An attacker could exploit this vulnerability by placing a binary of their choosing earlier in the search path utilized by Cisco Directory Connector to locate and load required resources.

CVSS3: 5.1
EPSS: Низкий
github логотип

GHSA-m57f-9997-gm6m

больше 3 лет назад

A vulnerability in the search path processing of Cisco Directory Connector could allow an authenticated, local attacker to load a binary of their choosing. The vulnerability is due to uncontrolled search path elements. An attacker could exploit this vulnerability by placing a binary of their choosing earlier in the search path utilized by Cisco Directory Connector to locate and load required resources.

CVSS3: 5.1
EPSS: Низкий
fstec логотип

BDU:2019-01897

почти 7 лет назад

Уязвимость приложения для синхронизации идентификаторов в облаке Cisco Directory Connector, связанная с ошибками механизма проверки пути поиска, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1794

A vulnerability in the search path processing of Cisco Directory Connector could allow an authenticated, local attacker to load a binary of their choosing. The vulnerability is due to uncontrolled search path elements. An attacker could exploit this vulnerability by placing a binary of their choosing earlier in the search path utilized by Cisco Directory Connector to locate and load required resources.

CVSS3: 5.1
0%
Низкий
почти 7 лет назад
github логотип
GHSA-m57f-9997-gm6m

A vulnerability in the search path processing of Cisco Directory Connector could allow an authenticated, local attacker to load a binary of their choosing. The vulnerability is due to uncontrolled search path elements. An attacker could exploit this vulnerability by placing a binary of their choosing earlier in the search path utilized by Cisco Directory Connector to locate and load required resources.

CVSS3: 5.1
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-01897

Уязвимость приложения для синхронизации идентификаторов в облаке Cisco Directory Connector, связанная с ошибками механизма проверки пути поиска, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.1
0%
Низкий
почти 7 лет назад

Уязвимостей на страницу