Логотип exploitDog
bind:CVE-2020-3246
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3246

Количество 3

Количество 3

nvd логотип

CVE-2020-3246

почти 6 лет назад

A vulnerability in the web server of Cisco Umbrella could allow an unauthenticated, remote attacker to perform a carriage return line feed (CRLF) injection attack against a user of an affected service. The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to the browser of the user.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-j53q-vx25-fmqm

больше 3 лет назад

A vulnerability in the web server of Cisco Umbrella could allow an unauthenticated, remote attacker to perform a carriage return line feed (CRLF) injection attack against a user of an affected service. The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to the browser of the user.

EPSS: Низкий
fstec логотип

BDU:2020-02150

почти 6 лет назад

Уязвимость облачного сервиса безопасности Cisco Umbrella, связанная с недостатками процедуры нейтрализации особых элементов в выходных данных, используемых входящим компонентом, позволяющая нарушителю выполнить произвольный код с помощью специально подготовленного URL

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3246

A vulnerability in the web server of Cisco Umbrella could allow an unauthenticated, remote attacker to perform a carriage return line feed (CRLF) injection attack against a user of an affected service. The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to the browser of the user.

CVSS3: 4.3
0%
Низкий
почти 6 лет назад
github логотип
GHSA-j53q-vx25-fmqm

A vulnerability in the web server of Cisco Umbrella could allow an unauthenticated, remote attacker to perform a carriage return line feed (CRLF) injection attack against a user of an affected service. The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to the browser of the user.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-02150

Уязвимость облачного сервиса безопасности Cisco Umbrella, связанная с недостатками процедуры нейтрализации особых элементов в выходных данных, используемых входящим компонентом, позволяющая нарушителю выполнить произвольный код с помощью специально подготовленного URL

CVSS3: 4.7
0%
Низкий
почти 6 лет назад

Уязвимостей на страницу