Логотип exploitDog
bind:CVE-2022-20951
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-20951

Количество 3

Количество 3

nvd логотип

CVE-2022-20951

больше 3 лет назад

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]]

CVSS3: 7.7
EPSS: Низкий
github логотип

GHSA-ffvm-pvfj-68q9

больше 3 лет назад

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]]

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2022-06806

больше 3 лет назад

Уязвимость веб-интерфейса управления программного средства Cisco BroadWorks CommPilot Application Software, позволяющая нарушителю осуществить SSRF-атаку

CVSS3: 7.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-20951

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]]

CVSS3: 7.7
1%
Низкий
больше 3 лет назад
github логотип
GHSA-ffvm-pvfj-68q9

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]]

CVSS3: 6.5
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-06806

Уязвимость веб-интерфейса управления программного средства Cisco BroadWorks CommPilot Application Software, позволяющая нарушителю осуществить SSRF-атаку

CVSS3: 7.7
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу