VYPR
Unrated severityNVD Advisory· Published May 30, 2015· Updated May 6, 2026

CVE-2015-0745

CVE-2015-0745

Description

Cisco Headend System Release allows remote attackers to read temporary script files or archive files, and consequently obtain sensitive information, via a crafted header in an HTTP request, aka Bug ID CSCus44909.

Affected products

7
  • cpe:2.3:o:cisco:headend_digital_broadband_delivery_system:-:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:headend_system_release:2.5:*:*:*:*:*:*:*+ 5 more
    • cpe:2.3:o:cisco:headend_system_release:2.5:*:*:*:*:*:*:*
    • cpe:2.3:o:cisco:headend_system_release:2.7:*:*:*:*:*:*:*
    • cpe:2.3:o:cisco:headend_system_release:3.2:*:*:*:*:*:*:*
    • cpe:2.3:o:cisco:headend_system_release:3.5:*:*:*:*:*:*:*
    • cpe:2.3:o:cisco:headend_system_release:3.7:*:*:*:*:*:*:*
    • cpe:2.3:o:cisco:headend_system_release:i4.3:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.