Логотип exploitDog
bind:CVE-2020-3521
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3521

Количество 3

Количество 3

nvd логотип

CVE-2020-3521

больше 5 лет назад

A vulnerability in a specific REST API of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker with a low-privileged account could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to read arbitrary files on the affected system.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-89j8-pfrr-r63r

больше 3 лет назад

A vulnerability in a specific REST API of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker with a low-privileged account could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to read arbitrary files on the affected system.

EPSS: Низкий
fstec логотип

BDU:2020-05798

больше 5 лет назад

Уязвимость реализации интерфейса REST API системы сетевого управления центром обработки данных Cisco Data Center Network Manager (DCNM), позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3521

A vulnerability in a specific REST API of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker with a low-privileged account could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to read arbitrary files on the affected system.

CVSS3: 5.3
0%
Низкий
больше 5 лет назад
github логотип
GHSA-89j8-pfrr-r63r

A vulnerability in a specific REST API of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker with a low-privileged account could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to read arbitrary files on the affected system.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-05798

Уязвимость реализации интерфейса REST API системы сетевого управления центром обработки данных Cisco Data Center Network Manager (DCNM), позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 5.3
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу