Логотип exploitDog
bind:CVE-2023-20179
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-20179

Количество 3

Количество 3

nvd логотип

CVE-2023-20179

больше 2 лет назад

A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content. This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-6g9h-226r-qp89

больше 2 лет назад

A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content. This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application.

CVSS3: 4.3
EPSS: Низкий
fstec логотип

BDU:2023-06247

больше 3 лет назад

Уязвимость веб-интерфейса управления централизованной системы управления сетью Cisco Catalyst SD-WAN Manager (ранее Cisco SD-WAN vManage), позволяющая нарушителю проводить межсайтовые сценарные атаки

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-20179

A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content. This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-6g9h-226r-qp89

A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content. This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-06247

Уязвимость веб-интерфейса управления централизованной системы управления сетью Cisco Catalyst SD-WAN Manager (ранее Cisco SD-WAN vManage), позволяющая нарушителю проводить межсайтовые сценарные атаки

CVSS3: 4.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу