Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7jwx-cjhh-mfjj

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The API in the Guest Server in Cisco Jabber, when HTML5 is used, allows remote attackers to obtain sensitive information by sniffing the network during an HTTP (1) GET or (2) POST response, aka Bug ID CSCus19801.

The API in the Guest Server in Cisco Jabber, when HTML5 is used, allows remote attackers to obtain sensitive information by sniffing the network during an HTTP (1) GET or (2) POST response, aka Bug ID CSCus19801.

EPSS

Процентиль: 59%
0.00388
Низкий

Дефекты

CWE-200

Связанные уязвимости

nvd
около 11 лет назад

The API in the Guest Server in Cisco Jabber, when HTML5 is used, allows remote attackers to obtain sensitive information by sniffing the network during an HTTP (1) GET or (2) POST response, aka Bug ID CSCus19801.

EPSS

Процентиль: 59%
0.00388
Низкий

Дефекты

CWE-200