Computer Security
[EN] securityvulns.ru no-pyccku


Cisco Application Velocity System TCP port relaying
Published:11.05.2006
Source:
SecurityVulns ID:6124
Type:remote
Threat Level:
5/10
Description:Default configuration allows any TCP port to be accessed with transparent HTTP proxy request.
Affected:CISCO : AVS 3110 4.0
 CISCO : AVS 3110 5.0
 CISCO : AVS 3120 5.0
Original documentdocumentCISCO, Cisco Security Advisory: AVS TCP Relay Vulnerability (11.05.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod