目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2020-3345— Cisco Webex Meetings和Webex Meetings Server 输入验证错误漏洞

EPSS 0.53% · P68
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2020-3345の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Cisco Webex Meetings and Cisco Webex Meetings Server HTML Injection Vulnerability
ソース: NVD (National Vulnerability Database)
脆弱性説明
A vulnerability in certain web pages of Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to modify a web page in the context of a browser. The vulnerability is due to improper checks on parameter values within affected pages. An attacker could exploit this vulnerability by persuading a user to follow a crafted link that is designed to pass HTML code into an affected parameter. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious web sites, or the attacker could leverage this vulnerability to conduct further client-side attacks.
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
输入验证不恰当
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Cisco Webex Meetings和Webex Meetings Server 输入验证错误漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Cisco WebEx Meetings Server(CWMS)和Cisco Webex Meetings都是美国思科(Cisco)公司的产品。Cisco WebEx Meetings Server是WebEx会议方案中的一套包含音频、视频和Web会议的多功能会议解决方案。Cisco Webex Meetings是一套视频会议解决方案。 Cisco Webex Meetings 40.6.0之前版本和Cisco Webex Meetings Server 4.0 MR3之前版本中的网页存在输入验证错误漏
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
CiscoCisco WebEx Meetings Server n/a -

II. CVE-2020-3345の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2020-3345のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Cisco · 2020-07-16 · 33 CVEs total

CVE-2020-33579.8 CRITICALCisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Remote Code Execut
CVE-2020-33588.6 HIGHCisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service
CVE-2020-33726.5 MEDIUMCisco SD-WAN vManage Software Denial of Service Vulnerability
CVE-2020-34504.9 MEDIUMCisco Vision Dynamic Signage Director SQL Injection Vulnerability
CVE-2020-3146Cisco RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execut
CVE-2020-3150Cisco Small Business RV110W and RV215W Series Routers Information Disclosure Vulnerability
CVE-2020-3180Cisco SD-WAN Solution Software Static Credentials Vulnerability
CVE-2020-3197Cisco Meetings App Missing TURN Server Credentials Expiration Vulnerability
CVE-2020-3323Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote
CVE-2020-3330Cisco Small Business RV110W Wireless-N VPN Firewall Static Default Credential Vulnerabilit
CVE-2020-3331Cisco RV110W and RV215W Series Routers Arbitrary Code Execution Vulnerability
CVE-2020-3332Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers Command Shell Inject
CVE-2020-3348Cisco Data Center Network Manager Cross-Site Scripting Vulnerabilities
CVE-2020-3145Cisco RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execut
CVE-2020-3349Cisco Data Center Network Manager Cross-Site Scripting Vulnerabilities
CVE-2020-3351Cisco SD-WAN Solution Software Denial of Service Vulnerability
CVE-2020-3144Cisco RV110W, RV130, RV130W, and RV215W Routers Authentication Bypass Vulnerability
CVE-2020-3140Cisco Prime License Manager Privilege Escalation Vulnerability
CVE-2020-3369Cisco SD-WAN vEdge Routers Denial of Service Vulnerability
CVE-2020-3370Cisco Content Security Management Appliance Filter Bypass Vulnerability

Showing 20 of 33 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2020-3345へのコメント

まだコメントはありません


コメントを残す