Логотип exploitDog
bind:CVE-2023-20103
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-20103

Количество 3

Количество 3

nvd логотип

CVE-2023-20103

почти 3 года назад

A vulnerability in Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code as a root user on an affected device. This vulnerability is due to insufficient validation of user input to the web interface. An attacker could exploit this vulnerability by uploading a crafted file to an affected device. A successful exploit could allow the attacker to execute code on the affected device. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.

CVSS3: 4.9
EPSS: Низкий
github логотип

GHSA-p3w4-57rf-g962

почти 3 года назад

A vulnerability in Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code as a root user on an affected device. This vulnerability is due to insufficient validation of user input to the web interface. An attacker could exploit this vulnerability by uploading a crafted file to an affected device. A successful exploit could allow the attacker to execute code on the affected device. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.

CVSS3: 7.2
EPSS: Низкий
fstec логотип

BDU:2023-01955

почти 3 года назад

Уязвимость веб-интерфейса системы анализа сетевого трафика, сетевого обнаружения и реагирования Cisco Secure Network Analytics (ранее Cisco Stealthwatch Enterprise), позволяющая нарушителю выполнить произвольный код

CVSS3: 6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-20103

A vulnerability in Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code as a root user on an affected device. This vulnerability is due to insufficient validation of user input to the web interface. An attacker could exploit this vulnerability by uploading a crafted file to an affected device. A successful exploit could allow the attacker to execute code on the affected device. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.

CVSS3: 4.9
0%
Низкий
почти 3 года назад
github логотип
GHSA-p3w4-57rf-g962

A vulnerability in Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code as a root user on an affected device. This vulnerability is due to insufficient validation of user input to the web interface. An attacker could exploit this vulnerability by uploading a crafted file to an affected device. A successful exploit could allow the attacker to execute code on the affected device. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.

CVSS3: 7.2
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-01955

Уязвимость веб-интерфейса системы анализа сетевого трафика, сетевого обнаружения и реагирования Cisco Secure Network Analytics (ранее Cisco Stealthwatch Enterprise), позволяющая нарушителю выполнить произвольный код

CVSS3: 6
0%
Низкий
почти 3 года назад

Уязвимостей на страницу