Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2019-05-15 |
Product | Video Surveillance Manager | Last view | 2019-05-15 |
Version | 7.21 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:cisco:video_surveillance_manager |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2019-05-15 | CVE-2019-1717 | A vulnerability in the web-based management interface of Cisco Video Surveillance Manager could allow an unauthenticated, remote attacker to access sensitive information. The vulnerability is due to improper validation of parameters handled by the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to an affected component. A successful exploit could allow the attacker to download arbitrary files from the affected device, which could contain sensitive information. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-05 | Cisco Video Surveillance Manager directory traversal attempt RuleID : 50136 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Video Surveillance Manager directory traversal attempt RuleID : 50135 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Video Surveillance Manager directory traversal attempt RuleID : 50134 - Type : SERVER-WEBAPP - Revision : 1 |