Unrated severityNVD Advisory· Published May 30, 2015· Updated May 6, 2026
CVE-2015-0745
CVE-2015-0745
Description
Cisco Headend System Release allows remote attackers to read temporary script files or archive files, and consequently obtain sensitive information, via a crafted header in an HTTP request, aka Bug ID CSCus44909.
Affected products
7- cpe:2.3:o:cisco:headend_digital_broadband_delivery_system:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:headend_system_release:2.5:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:o:cisco:headend_system_release:2.5:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:headend_system_release:2.7:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:headend_system_release:3.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:headend_system_release:3.5:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:headend_system_release:3.7:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:headend_system_release:i4.3:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- tools.cisco.com/security/center/viewAlert.xnvdVendor Advisory
- www.securitytracker.com/id/1032445nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.