Логотип exploitDog
bind:CVE-2022-28161
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-28161

Количество 2

Количество 2

nvd логотип

CVE-2022-28161

почти 4 года назад

An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh passwords in filetansfer.log in debug mode. To exploit this vulnerability, the attacker would need to have valid user credentials and turn on debug mode.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-2qpf-6hhx-qxxg

больше 3 лет назад

An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh passwords in filetansfer.log in debug mode. To exploit this vulnerability, the attacker would need to have valid user credentials and turn on debug mode.

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-28161

An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh passwords in filetansfer.log in debug mode. To exploit this vulnerability, the attacker would need to have valid user credentials and turn on debug mode.

CVSS3: 5.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-2qpf-6hhx-qxxg

An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh passwords in filetansfer.log in debug mode. To exploit this vulnerability, the attacker would need to have valid user credentials and turn on debug mode.

CVSS3: 5.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу