Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5jm7-hvq6-jjvh

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

US Robotics/3Com Total Control Chassis with Frame Relay between 3.6.22 and 3.7.24 does not properly enforce access filters when the "set host prompt" setting is made for a port, which allows attackers to bypass restrictions by providing the hostname twice at the "host: " prompt.

US Robotics/3Com Total Control Chassis with Frame Relay between 3.6.22 and 3.7.24 does not properly enforce access filters when the "set host prompt" setting is made for a port, which allows attackers to bypass restrictions by providing the hostname twice at the "host: " prompt.

EPSS

Процентиль: 63%
0.00467
Низкий

Связанные уязвимости

nvd
около 27 лет назад

US Robotics/3Com Total Control Chassis with Frame Relay between 3.6.22 and 3.7.24 does not properly enforce access filters when the "set host prompt" setting is made for a port, which allows attackers to bypass restrictions by providing the hostname twice at the "host: " prompt.

EPSS

Процентиль: 63%
0.00467
Низкий