Логотип exploitDog
bind:CVE-2020-3546
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3546

Количество 3

Количество 3

nvd логотип

CVE-2020-3546

больше 5 лет назад

A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to insufficient validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface of an affected device. A successful exploit could allow the attacker to obtain the IP addresses that are configured on the internal interfaces of the affected device. There is a workaround that addresses this vulnerability.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-9ggw-5jfc-f28m

больше 3 лет назад

A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to insufficient validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface of an affected device. A successful exploit could allow the attacker to obtain the IP addresses that are configured on the internal interfaces of the affected device. There is a workaround that addresses this vulnerability.

EPSS: Низкий
fstec логотип

BDU:2020-04728

больше 5 лет назад

Уязвимость веб-интерфейса управления программного обеспечения Cisco AsyncOS для систем обеспечения безопасности электронной почты Cisco Email Security Appliance, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3546

A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to insufficient validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface of an affected device. A successful exploit could allow the attacker to obtain the IP addresses that are configured on the internal interfaces of the affected device. There is a workaround that addresses this vulnerability.

CVSS3: 5.3
1%
Низкий
больше 5 лет назад
github логотип
GHSA-9ggw-5jfc-f28m

A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to insufficient validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface of an affected device. A successful exploit could allow the attacker to obtain the IP addresses that are configured on the internal interfaces of the affected device. There is a workaround that addresses this vulnerability.

1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-04728

Уязвимость веб-интерфейса управления программного обеспечения Cisco AsyncOS для систем обеспечения безопасности электронной почты Cisco Email Security Appliance, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.3
1%
Низкий
больше 5 лет назад

Уязвимостей на страницу