Логотип exploitDog
bind:CVE-2020-13122
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-13122

Количество 2

Количество 2

nvd логотип

CVE-2020-13122

больше 5 лет назад

The novish command-line interface, included in NoviFlow NoviWare before NW500.2.12 and deployed on NoviSwitch devices, is vulnerable to command injection in the "show status destination ipaddr" command. This could be used by a read-only user (monitoring group) or admin to execute commands on the operating system.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-h89w-3xmp-4vpc

больше 3 лет назад

The novish command-line interface, included in NoviFlow NoviWare before NW500.2.12 and deployed on NoviSwitch devices, is vulnerable to command injection in the "show status destination ipaddr" command. This could be used by a read-only user (monitoring group) or admin to execute commands on the operating system.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-13122

The novish command-line interface, included in NoviFlow NoviWare before NW500.2.12 and deployed on NoviSwitch devices, is vulnerable to command injection in the "show status destination ipaddr" command. This could be used by a read-only user (monitoring group) or admin to execute commands on the operating system.

CVSS3: 8.8
7%
Низкий
больше 5 лет назад
github логотип
GHSA-h89w-3xmp-4vpc

The novish command-line interface, included in NoviFlow NoviWare before NW500.2.12 and deployed on NoviSwitch devices, is vulnerable to command injection in the "show status destination ipaddr" command. This could be used by a read-only user (monitoring group) or admin to execute commands on the operating system.

CVSS3: 8.8
7%
Низкий
больше 3 лет назад

Уязвимостей на страницу