Описание
Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset to TCC, TCC+, TCCi or XTC) via a malformed HTTP request that does not contain a leading / (slash) character.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*
EPSS
Процентиль: 65%
0.00486
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset to TCC, TCC+, TCCi or XTC) via a malformed HTTP request that does not contain a leading / (slash) character.
EPSS
Процентиль: 65%
0.00486
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other