Логотип exploitDog
bind:CVE-2024-20277
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-20277

Количество 3

Количество 3

nvd логотип

CVE-2024-20277

около 2 лет назад

A vulnerability in the web-based management interface of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands and elevate privileges to root.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-w7jv-24hg-q599

около 2 лет назад

A vulnerability in the web-based management interface of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands and elevate privileges to root.

CVSS3: 6.8
EPSS: Низкий
fstec логотип

BDU:2024-01077

около 2 лет назад

Уязвимость веб-интерфейса управления программного обеспечения для анализа сетей Cisco ThousandEyes Enterprise Agent, позволяющая нарушителю выполнить произвольные команды и повысить свои привилегии до уровня root

CVSS3: 8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-20277

A vulnerability in the web-based management interface of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands and elevate privileges to root.

CVSS3: 6.8
0%
Низкий
около 2 лет назад
github логотип
GHSA-w7jv-24hg-q599

A vulnerability in the web-based management interface of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands and elevate privileges to root.

CVSS3: 6.8
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-01077

Уязвимость веб-интерфейса управления программного обеспечения для анализа сетей Cisco ThousandEyes Enterprise Agent, позволяющая нарушителю выполнить произвольные команды и повысить свои привилегии до уровня root

CVSS3: 8
0%
Низкий
около 2 лет назад

Уязвимостей на страницу