Логотип exploitDog
bind:CVE-2020-3519
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3519

Количество 3

Количество 3

nvd логотип

CVE-2020-3519

больше 5 лет назад

A vulnerability in a specific REST API method of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-pgmp-52m7-9hfg

больше 3 лет назад

A vulnerability in a specific REST API method of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.

EPSS: Низкий
fstec логотип

BDU:2020-05800

больше 5 лет назад

Уязвимость реализации интерфейса REST API системы сетевого управления центром обработки данных Cisco Data Center Network Manager (DCNM), позволяющая нарушителю перезаписать произвольные файлы на устройстве

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3519

A vulnerability in a specific REST API method of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.

CVSS3: 8.1
0%
Низкий
больше 5 лет назад
github логотип
GHSA-pgmp-52m7-9hfg

A vulnerability in a specific REST API method of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-05800

Уязвимость реализации интерфейса REST API системы сетевого управления центром обработки данных Cisco Data Center Network Manager (DCNM), позволяющая нарушителю перезаписать произвольные файлы на устройстве

CVSS3: 5.4
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу