Логотип exploitDog
bind:CVE-2020-3241
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3241

Количество 3

Количество 3

nvd логотип

CVE-2020-3241

больше 5 лет назад

A vulnerability in the orchestration tasks of Cisco UCS Director could allow an authenticated, remote attacker to perform a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input on the web-based management interface. An attacker could exploit this vulnerability by creating a task with specific configuration parameters. A successful exploit could allow the attacker to overwrite arbitrary files in the file system of an affected device.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-9qfx-7mxj-67c9

больше 3 лет назад

A vulnerability in the orchestration tasks of Cisco UCS Director could allow an authenticated, remote attacker to perform a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input on the web-based management interface. An attacker could exploit this vulnerability by creating a task with specific configuration parameters. A successful exploit could allow the attacker to overwrite arbitrary files in the file system of an affected device.

EPSS: Низкий
fstec логотип

BDU:2020-03119

больше 5 лет назад

Уязвимость средства управления физической инфраструктурой и виртуальными средами Cisco UCS Director, позволяющая нарушителю перезаписать произвольные файлы в файловой системе уязвимого устройства

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3241

A vulnerability in the orchestration tasks of Cisco UCS Director could allow an authenticated, remote attacker to perform a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input on the web-based management interface. An attacker could exploit this vulnerability by creating a task with specific configuration parameters. A successful exploit could allow the attacker to overwrite arbitrary files in the file system of an affected device.

CVSS3: 6.5
0%
Низкий
больше 5 лет назад
github логотип
GHSA-9qfx-7mxj-67c9

A vulnerability in the orchestration tasks of Cisco UCS Director could allow an authenticated, remote attacker to perform a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input on the web-based management interface. An attacker could exploit this vulnerability by creating a task with specific configuration parameters. A successful exploit could allow the attacker to overwrite arbitrary files in the file system of an affected device.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-03119

Уязвимость средства управления физической инфраструктурой и виртуальными средами Cisco UCS Director, позволяющая нарушителю перезаписать произвольные файлы в файловой системе уязвимого устройства

CVSS3: 6.5
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу