Computer Security
[EN] securityvulns.ru no-pyccku


Cisco Catalist loopback address access protection bypass
Published:01.10.2007
Source:
SecurityVulns ID:8203
Type:remote
Threat Level:
5/10
Description:SNMP access by address 127.0.0.x is possible, making it possible to bypass IP filtering.
Affected:CISCO : CatOS 5.5
Original documentdocumentlee.e.rian_(at)_census.gov, [Full-disclosure] CAT6500 accessible via 127.0.0.x loopback addresses (01.10.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod