Логотип exploitDog
bind:CVE-2024-51978
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-51978

Количество 2

Количество 2

nvd логотип

CVE-2024-51978

8 месяцев назад

An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-2mr3-j246-x7x3

8 месяцев назад

An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-51978

An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.

CVSS3: 9.8
48%
Средний
8 месяцев назад
github логотип
GHSA-2mr3-j246-x7x3

An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.

CVSS3: 9.8
48%
Средний
8 месяцев назад

Уязвимостей на страницу