Логотип exploitDog
bind:CVE-2022-20784
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-20784

Количество 3

Количество 3

nvd логотип

CVE-2022-20784

почти 4 года назад

A vulnerability in the Web-Based Reputation Score (WBRS) engine of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass established web request policies and access blocked content on an affected device. This vulnerability is due to incorrect handling of certain character combinations inserted into a URL. An attacker could exploit this vulnerability by sending crafted URLs to be processed by an affected device. A successful exploit could allow the attacker to bypass the web proxy and access web content that has been blocked by policy.

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-vv88-544v-pvq3

почти 4 года назад

A vulnerability in the Web-Based Reputation Score (WBRS) engine of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass established web request policies and access blocked content on an affected device. This vulnerability is due to incorrect handling of certain character combinations inserted into a URL. An attacker could exploit this vulnerability by sending crafted URLs to be processed by an affected device. A successful exploit could allow the attacker to bypass the web proxy and access web content that has been blocked by policy.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2022-02217

больше 4 лет назад

Уязвимость механизма Web-Based Reputation Score (WBRS) операционной системы Cisco AsyncOS интернет-шлюзов Cisco Web Security Appliance, позволяющая нарушителю получить доступ к заблокированному контенту

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-20784

A vulnerability in the Web-Based Reputation Score (WBRS) engine of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass established web request policies and access blocked content on an affected device. This vulnerability is due to incorrect handling of certain character combinations inserted into a URL. An attacker could exploit this vulnerability by sending crafted URLs to be processed by an affected device. A successful exploit could allow the attacker to bypass the web proxy and access web content that has been blocked by policy.

CVSS3: 5.8
1%
Низкий
почти 4 года назад
github логотип
GHSA-vv88-544v-pvq3

A vulnerability in the Web-Based Reputation Score (WBRS) engine of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass established web request policies and access blocked content on an affected device. This vulnerability is due to incorrect handling of certain character combinations inserted into a URL. An attacker could exploit this vulnerability by sending crafted URLs to be processed by an affected device. A successful exploit could allow the attacker to bypass the web proxy and access web content that has been blocked by policy.

CVSS3: 5.3
1%
Низкий
почти 4 года назад
fstec логотип
BDU:2022-02217

Уязвимость механизма Web-Based Reputation Score (WBRS) операционной системы Cisco AsyncOS интернет-шлюзов Cisco Web Security Appliance, позволяющая нарушителю получить доступ к заблокированному контенту

CVSS3: 5.8
1%
Низкий
больше 4 лет назад

Уязвимостей на страницу