cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-3336,https://securityvulnerability.io/vulnerability/CVE-2020-3336,Cisco TelePresence Collaboration Endpoint and RoomOS Software Command Injection Vulnerability,"A vulnerability in the software upgrade process of Cisco TelePresence Collaboration Endpoint Software and Cisco RoomOS Software could allow an authenticated, remote attacker to modify the filesystem to cause a denial of service (DoS) or gain privileged access to the root filesystem. The vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending requests with malformed parameters to the system using the console, Secure Shell (SSH), or web API. A successful exploit could allow the attacker to modify the device configuration or cause a DoS.",Cisco,Cisco Telepresence Ce Software,7.2,HIGH,0.0028899998869746923,false,,false,false,true,2024-08-04T08:16:35.000Z,,false,false,,2020-06-18T03:15:00.000Z,0 CVE-2019-12622,https://securityvulnerability.io/vulnerability/CVE-2019-12622,Cisco RoomOS Software Privilege Escalation Vulnerability,"A vulnerability in Cisco RoomOS Software could allow an authenticated, local attacker to write files to the underlying filesystem with root privileges. The vulnerability is due to insufficient permission restrictions on a specific process. An attacker could exploit this vulnerability by logging in to an affected device with remote support credentials and initiating the specific process on the device and sending crafted data to that process. A successful exploit could allow the attacker to write files to the underlying file system with root privileges.",Cisco,Cisco Telepresence Ce Software,4.1,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-11-21T20:15:03.000Z,,false,false,,2019-08-21T00:00:00.000Z,0