Логотип exploitDog
bind:CVE-2024-20352
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-20352

Количество 3

Количество 3

nvd логотип

CVE-2024-20352

почти 2 года назад

A vulnerability in Cisco Emergency Responder could allow an authenticated, remote attacker to conduct a directory traversal attack, which could allow the attacker to perform arbitrary actions on an affected device. This vulnerability is due to insufficient protections for the web UI of an affected system. An attacker could exploit this vulnerability by sending crafted requests to the web UI. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user, such as accessing password or log files or uploading and deleting existing files from the system.

CVSS3: 4.9
EPSS: Низкий
github логотип

GHSA-4pgp-hx9q-53rp

почти 2 года назад

A vulnerability in Cisco Emergency Responder could allow an authenticated, remote attacker to conduct a directory traversal attack, which could allow the attacker to perform arbitrary actions on an affected device. This vulnerability is due to insufficient protections for the web UI of an affected system. An attacker could exploit this vulnerability by sending crafted requests to the web UI. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user, such as accessing password or log files or uploading and deleting existing files from the system.

CVSS3: 4.9
EPSS: Низкий
fstec логотип

BDU:2024-04173

почти 2 года назад

Уязвимость веб-интерфейса сервера управления и мониторинга экстренных вызовов Cisco Emergency Responder, позволяющая нарушителю получить доступ на чтение, изменение или удаление данных

CVSS3: 4.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-20352

A vulnerability in Cisco Emergency Responder could allow an authenticated, remote attacker to conduct a directory traversal attack, which could allow the attacker to perform arbitrary actions on an affected device. This vulnerability is due to insufficient protections for the web UI of an affected system. An attacker could exploit this vulnerability by sending crafted requests to the web UI. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user, such as accessing password or log files or uploading and deleting existing files from the system.

CVSS3: 4.9
0%
Низкий
почти 2 года назад
github логотип
GHSA-4pgp-hx9q-53rp

A vulnerability in Cisco Emergency Responder could allow an authenticated, remote attacker to conduct a directory traversal attack, which could allow the attacker to perform arbitrary actions on an affected device. This vulnerability is due to insufficient protections for the web UI of an affected system. An attacker could exploit this vulnerability by sending crafted requests to the web UI. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user, such as accessing password or log files or uploading and deleting existing files from the system.

CVSS3: 4.9
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-04173

Уязвимость веб-интерфейса сервера управления и мониторинга экстренных вызовов Cisco Emergency Responder, позволяющая нарушителю получить доступ на чтение, изменение или удаление данных

CVSS3: 4.9
0%
Низкий
почти 2 года назад

Уязвимостей на страницу