Логотип exploitDog
bind:CVE-2022-20747
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-20747

Количество 3

Количество 3

nvd логотип

CVE-2022-20747

почти 4 года назад

A vulnerability in the History API of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected system. This vulnerability is due to insufficient API authorization checking on the underlying operating system. An attacker could exploit this vulnerability by sending a crafted API request to Cisco vManage as a lower-privileged user and gaining access to sensitive information that they would not normally be authorized to access.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-82gm-q2vc-g3x3

почти 4 года назад

A vulnerability in the History API of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected system. This vulnerability is due to insufficient API authorization checking on the underlying operating system. An attacker could exploit this vulnerability by sending a crafted API request to Cisco vManage as a lower-privileged user and gaining access to sensitive information that they would not normally be authorized to access.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2022-02666

почти 4 года назад

Уязвимость компонента History API централизованной системой управления сетью Cisco SD-WAN vManage, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-20747

A vulnerability in the History API of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected system. This vulnerability is due to insufficient API authorization checking on the underlying operating system. An attacker could exploit this vulnerability by sending a crafted API request to Cisco vManage as a lower-privileged user and gaining access to sensitive information that they would not normally be authorized to access.

CVSS3: 6.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-82gm-q2vc-g3x3

A vulnerability in the History API of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected system. This vulnerability is due to insufficient API authorization checking on the underlying operating system. An attacker could exploit this vulnerability by sending a crafted API request to Cisco vManage as a lower-privileged user and gaining access to sensitive information that they would not normally be authorized to access.

CVSS3: 6.5
0%
Низкий
почти 4 года назад
fstec логотип
BDU:2022-02666

Уязвимость компонента History API централизованной системой управления сетью Cisco SD-WAN vManage, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 6.5
0%
Низкий
почти 4 года назад

Уязвимостей на страницу