Логотип exploitDog
bind:CVE-2020-3299
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3299

Количество 5

Количество 5

ubuntu логотип

CVE-2020-3299

больше 5 лет назад

Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured File Policy for HTTP. The vulnerability is due to incorrect detection of modified HTTP packets used in chunked responses. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured File Policy for HTTP packets and deliver a malicious payload.

CVSS3: 5.8
EPSS: Низкий
nvd логотип

CVE-2020-3299

больше 5 лет назад

Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured File Policy for HTTP. The vulnerability is due to incorrect detection of modified HTTP packets used in chunked responses. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured File Policy for HTTP packets and deliver a malicious payload.

CVSS3: 5.8
EPSS: Низкий
debian логотип

CVE-2020-3299

больше 5 лет назад

Multiple Cisco products are affected by a vulnerability in the Snort d ...

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-j2v5-cw33-rvx6

больше 3 лет назад

Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured File Policy for HTTP. The vulnerability is due to incorrect detection of modified HTTP packets used in chunked responses. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured File Policy for HTTP packets and deliver a malicious payload.

CVSS3: 5.8
EPSS: Низкий
fstec логотип

BDU:2020-05262

больше 5 лет назад

Уязвимость системы обнаружения вторжений Snort микропрограммного обеспечения межсетевого экрана Cisco Firepower Threat Defense (FTD), программно-определяемой сети Cisco SD-WAN, межсетевой операционной системы Cisco IOS XE и микропрограммного обеспечения cетевых устройств Cisco Meraki, позволяющая нарушителю обойти механизм защиты и выполнить вредоносную нагрузку

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-3299

Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured File Policy for HTTP. The vulnerability is due to incorrect detection of modified HTTP packets used in chunked responses. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured File Policy for HTTP packets and deliver a malicious payload.

CVSS3: 5.8
1%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-3299

Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured File Policy for HTTP. The vulnerability is due to incorrect detection of modified HTTP packets used in chunked responses. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured File Policy for HTTP packets and deliver a malicious payload.

CVSS3: 5.8
1%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-3299

Multiple Cisco products are affected by a vulnerability in the Snort d ...

CVSS3: 5.8
1%
Низкий
больше 5 лет назад
github логотип
GHSA-j2v5-cw33-rvx6

Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured File Policy for HTTP. The vulnerability is due to incorrect detection of modified HTTP packets used in chunked responses. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured File Policy for HTTP packets and deliver a malicious payload.

CVSS3: 5.8
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-05262

Уязвимость системы обнаружения вторжений Snort микропрограммного обеспечения межсетевого экрана Cisco Firepower Threat Defense (FTD), программно-определяемой сети Cisco SD-WAN, межсетевой операционной системы Cisco IOS XE и микропрограммного обеспечения cетевых устройств Cisco Meraki, позволяющая нарушителю обойти механизм защиты и выполнить вредоносную нагрузку

CVSS3: 5.8
1%
Низкий
больше 5 лет назад

Уязвимостей на страницу