Логотип exploitDog
bind:CVE-2019-13926
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-13926

Количество 3

Количество 3

nvd логотип

CVE-2019-13926

почти 6 лет назад

A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-vwh5-q72r-gr35

больше 3 лет назад

A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0), SCALANCE S612 (All versions >= V3.0), SCALANCE S623 (All versions >= V3.0), SCALANCE S627-2M (All versions >= V3.0). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device.

EPSS: Низкий
fstec логотип

BDU:2020-02441

почти 6 лет назад

Уязвимость микропрограммного обеспечения межсетевого экрана Siemens SCALANCE S, связанная с неконтролируемым расходом ресурса (Истощение), позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-13926

A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device.

CVSS3: 7.5
0%
Низкий
почти 6 лет назад
github логотип
GHSA-vwh5-q72r-gr35

A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0), SCALANCE S612 (All versions >= V3.0), SCALANCE S623 (All versions >= V3.0), SCALANCE S627-2M (All versions >= V3.0). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-02441

Уязвимость микропрограммного обеспечения межсетевого экрана Siemens SCALANCE S, связанная с неконтролируемым расходом ресурса (Истощение), позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
почти 6 лет назад

Уязвимостей на страницу