Количество 4
Количество 4
CVE-2020-3244
A vulnerability in the Enhanced Charging Service (ECS) functionality of Cisco ASR 5000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass the traffic classification rules on an affected device. The vulnerability is due to insufficient input validation of user traffic going through an affected device. An attacker could exploit this vulnerability by sending a malformed HTTP request to an affected device. A successful exploit could allow the attacker to bypass the traffic classification rules and potentially avoid being charged for traffic consumption.
GHSA-mp76-mqjp-pxx7
A vulnerability in the Enhanced Charging Service (ECS) functionality of Cisco ASR 5000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass the traffic classification rules on an affected device. The vulnerability is due to insufficient input validation of user traffic going through an affected device. An attacker could exploit this vulnerability by sending a malformed HTTP request to an affected device. A successful exploit could allow the attacker to bypass the traffic classification rules and potentially avoid being charged for traffic consumption.
BDU:2020-03148
Уязвимость службы Enhanced Charging Service микропрограммного обеспечения маршрутизатора Cisco ASR 5000, позволяющая нарушителю обойти правила классификации трафика и потенциально избежать оплаты за потребление трафика
BDU:2020-03150
Уязвимость системы автоматизации деятельности предприятия IBM Business Process Manager и программного средства автоматизации цифровых процессов IBM Business Automation Workflow, связанная с ошибками разграничения доступа, позволяющая нарушителю получить доступ к защищаемой информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-3244 A vulnerability in the Enhanced Charging Service (ECS) functionality of Cisco ASR 5000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass the traffic classification rules on an affected device. The vulnerability is due to insufficient input validation of user traffic going through an affected device. An attacker could exploit this vulnerability by sending a malformed HTTP request to an affected device. A successful exploit could allow the attacker to bypass the traffic classification rules and potentially avoid being charged for traffic consumption. | CVSS3: 5.3 | 0% Низкий | больше 5 лет назад | |
GHSA-mp76-mqjp-pxx7 A vulnerability in the Enhanced Charging Service (ECS) functionality of Cisco ASR 5000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass the traffic classification rules on an affected device. The vulnerability is due to insufficient input validation of user traffic going through an affected device. An attacker could exploit this vulnerability by sending a malformed HTTP request to an affected device. A successful exploit could allow the attacker to bypass the traffic classification rules and potentially avoid being charged for traffic consumption. | 0% Низкий | больше 3 лет назад | ||
BDU:2020-03148 Уязвимость службы Enhanced Charging Service микропрограммного обеспечения маршрутизатора Cisco ASR 5000, позволяющая нарушителю обойти правила классификации трафика и потенциально избежать оплаты за потребление трафика | CVSS3: 5.3 | 0% Низкий | больше 5 лет назад | |
BDU:2020-03150 Уязвимость системы автоматизации деятельности предприятия IBM Business Process Manager и программного средства автоматизации цифровых процессов IBM Business Automation Workflow, связанная с ошибками разграничения доступа, позволяющая нарушителю получить доступ к защищаемой информации | CVSS3: 5.3 | 0% Низкий | больше 5 лет назад |
Уязвимостей на страницу