Логотип exploitDog
bind:CVE-2008-2368
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2008-2368

Количество 3

Количество 3

redhat логотип

CVE-2008-2368

больше 16 лет назад

Red Hat Certificate System 7.2 stores passwords in cleartext in the UserDirEnrollment log, the RA wizard installer log, and unspecified other debug log files, and uses weak permissions for these files, which allows local users to discover passwords by reading the files.

EPSS: Низкий
nvd логотип

CVE-2008-2368

больше 16 лет назад

Red Hat Certificate System 7.2 stores passwords in cleartext in the UserDirEnrollment log, the RA wizard installer log, and unspecified other debug log files, and uses weak permissions for these files, which allows local users to discover passwords by reading the files.

CVSS2: 2.1
EPSS: Низкий
github логотип

GHSA-hj7g-ch5r-67hc

больше 3 лет назад

Red Hat Certificate System 7.2 stores passwords in cleartext in the UserDirEnrollment log, the RA wizard installer log, and unspecified other debug log files, and uses weak permissions for these files, which allows local users to discover passwords by reading the files.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2008-2368

Red Hat Certificate System 7.2 stores passwords in cleartext in the UserDirEnrollment log, the RA wizard installer log, and unspecified other debug log files, and uses weak permissions for these files, which allows local users to discover passwords by reading the files.

0%
Низкий
больше 16 лет назад
nvd логотип
CVE-2008-2368

Red Hat Certificate System 7.2 stores passwords in cleartext in the UserDirEnrollment log, the RA wizard installer log, and unspecified other debug log files, and uses weak permissions for these files, which allows local users to discover passwords by reading the files.

CVSS2: 2.1
0%
Низкий
больше 16 лет назад
github логотип
GHSA-hj7g-ch5r-67hc

Red Hat Certificate System 7.2 stores passwords in cleartext in the UserDirEnrollment log, the RA wizard installer log, and unspecified other debug log files, and uses weak permissions for these files, which allows local users to discover passwords by reading the files.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу