Логотип exploitDog
bind:CVE-2014-0669
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-0669

Количество 2

Количество 2

nvd логотип

CVE-2014-0669

около 12 лет назад

The Wireless Session Protocol (WSP) feature in the Gateway GPRS Support Node (GGSN) component on Cisco ASR 5000 series devices allows remote attackers to bypass intended Top-Up payment restrictions via unspecified WSP packets, aka Bug ID CSCuh28371.

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-x8mp-q875-3hv2

больше 3 лет назад

The Wireless Session Protocol (WSP) feature in the Gateway GPRS Support Node (GGSN) component on Cisco ASR 5000 series devices allows remote attackers to bypass intended Top-Up payment restrictions via unspecified WSP packets, aka Bug ID CSCuh28371.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2014-0669

The Wireless Session Protocol (WSP) feature in the Gateway GPRS Support Node (GGSN) component on Cisco ASR 5000 series devices allows remote attackers to bypass intended Top-Up payment restrictions via unspecified WSP packets, aka Bug ID CSCuh28371.

CVSS2: 5
1%
Низкий
около 12 лет назад
github логотип
GHSA-x8mp-q875-3hv2

The Wireless Session Protocol (WSP) feature in the Gateway GPRS Support Node (GGSN) component on Cisco ASR 5000 series devices allows remote attackers to bypass intended Top-Up payment restrictions via unspecified WSP packets, aka Bug ID CSCuh28371.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу