Логотип exploitDog
bind:CVE-2022-20663
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-20663

Количество 3

Количество 3

nvd логотип

CVE-2022-20663

около 1 года назад

A vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Stealthwatch Enterprise, could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see .

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-wp86-vvx6-h6hq

около 1 года назад

A vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Stealthwatch Enterprise, could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see .

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2022-00544

около 4 лет назад

Уязвимость веб-интерфейса управления системы анализа сетевого трафика, сетевого обнаружения и реагирования Cisco Secure Network Analytics (ранее Cisco Stealthwatch Enterprise), позволяющая нарушителю осуществлять межсайтовые сценарные атаки

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-20663

A vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Stealthwatch Enterprise, could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see .

CVSS3: 6.1
0%
Низкий
около 1 года назад
github логотип
GHSA-wp86-vvx6-h6hq

A vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Stealthwatch Enterprise, could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see .

CVSS3: 6.1
0%
Низкий
около 1 года назад
fstec логотип
BDU:2022-00544

Уязвимость веб-интерфейса управления системы анализа сетевого трафика, сетевого обнаружения и реагирования Cisco Secure Network Analytics (ранее Cisco Stealthwatch Enterprise), позволяющая нарушителю осуществлять межсайтовые сценарные атаки

CVSS3: 6.1
0%
Низкий
около 4 лет назад

Уязвимостей на страницу