Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j322-mvhj-p6c7

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.

The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.

EPSS

Процентиль: 70%
0.00633
Низкий

Связанные уязвимости

nvd
почти 13 лет назад

The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.

EPSS

Процентиль: 70%
0.00633
Низкий