Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-62q2-c83v-qvq3

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.

hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.

EPSS

Процентиль: 67%
0.00552
Низкий

Связанные уязвимости

ubuntu
почти 21 год назад

hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.

nvd
почти 21 год назад

hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.

debian
почти 21 год назад

hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfax ...

EPSS

Процентиль: 67%
0.00552
Низкий