Логотип exploitDog
bind:CVE-2006-7162
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-7162

Количество 4

Количество 4

ubuntu логотип

CVE-2006-7162

больше 18 лет назад

PuTTY 0.59 and earlier uses weak file permissions for (1) ppk files containing private keys generated by puttygen and (2) session logs created by putty, which allows local users to gain sensitive information by reading these files.

CVSS2: 1.9
EPSS: Низкий
nvd логотип

CVE-2006-7162

больше 18 лет назад

PuTTY 0.59 and earlier uses weak file permissions for (1) ppk files containing private keys generated by puttygen and (2) session logs created by putty, which allows local users to gain sensitive information by reading these files.

CVSS2: 1.9
EPSS: Низкий
debian логотип

CVE-2006-7162

больше 18 лет назад

PuTTY 0.59 and earlier uses weak file permissions for (1) ppk files co ...

CVSS2: 1.9
EPSS: Низкий
github логотип

GHSA-72fv-g98m-465j

больше 3 лет назад

PuTTY 0.59 and earlier uses weak file permissions for (1) ppk files containing private keys generated by puttygen and (2) session logs created by putty, which allows local users to gain sensitive information by reading these files.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2006-7162

PuTTY 0.59 and earlier uses weak file permissions for (1) ppk files containing private keys generated by puttygen and (2) session logs created by putty, which allows local users to gain sensitive information by reading these files.

CVSS2: 1.9
0%
Низкий
больше 18 лет назад
nvd логотип
CVE-2006-7162

PuTTY 0.59 and earlier uses weak file permissions for (1) ppk files containing private keys generated by puttygen and (2) session logs created by putty, which allows local users to gain sensitive information by reading these files.

CVSS2: 1.9
0%
Низкий
больше 18 лет назад
debian логотип
CVE-2006-7162

PuTTY 0.59 and earlier uses weak file permissions for (1) ppk files co ...

CVSS2: 1.9
0%
Низкий
больше 18 лет назад
github логотип
GHSA-72fv-g98m-465j

PuTTY 0.59 and earlier uses weak file permissions for (1) ppk files containing private keys generated by puttygen and (2) session logs created by putty, which allows local users to gain sensitive information by reading these files.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу