Логотип exploitDog
bind:CVE-2023-20076
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-20076

Количество 3

Количество 3

nvd логотип

CVE-2023-20076

почти 3 года назад

A vulnerability in the Cisco IOx application hosting environment could allow an authenticated, remote attacker to execute arbitrary commands as root on the underlying host operating system. This vulnerability is due to incomplete sanitization of parameters that are passed in for activation of an application. An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying host operating system.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-q7pv-4cxx-gq42

почти 3 года назад

A vulnerability in the Cisco IOx application hosting environment could allow an authenticated, remote attacker to execute arbitrary commands as root on the underlying host operating system. This vulnerability is due to incomplete sanitization of parameters that are passed in for activation of an application. An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying host operating system.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2023-00549

около 3 лет назад

Уязвимость программной платформы Cisco IOx, существующая из-за непринятия мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю выполнять произвольные команды в операционной системе с привилегиями root-пользователя

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-20076

A vulnerability in the Cisco IOx application hosting environment could allow an authenticated, remote attacker to execute arbitrary commands as root on the underlying host operating system. This vulnerability is due to incomplete sanitization of parameters that are passed in for activation of an application. An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying host operating system.

CVSS3: 7.2
0%
Низкий
почти 3 года назад
github логотип
GHSA-q7pv-4cxx-gq42

A vulnerability in the Cisco IOx application hosting environment could allow an authenticated, remote attacker to execute arbitrary commands as root on the underlying host operating system. This vulnerability is due to incomplete sanitization of parameters that are passed in for activation of an application. An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying host operating system.

CVSS3: 8.8
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-00549

Уязвимость программной платформы Cisco IOx, существующая из-за непринятия мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю выполнять произвольные команды в операционной системе с привилегиями root-пользователя

CVSS3: 7.2
0%
Низкий
около 3 лет назад

Уязвимостей на страницу