Логотип exploitDog
bind:CVE-2026-1495
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-1495

Количество 2

Количество 2

nvd логотип

CVE-2026-1495

2 дня назад

The vulnerability, if exploited, could allow an attacker with Event Log Reader (S-1-5-32-573) privileges to obtain proxy details, including URL and proxy credentials, from the PI to CONNECT event log files. This could enable unauthorized access to the proxy server.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-rj3h-xxg4-q2h4

2 дня назад

The vulnerability, if exploited, could allow an attacker with Event Log Reader (S-1-5-32-573) privileges to obtain proxy details, including URL and proxy credentials, from the PI to CONNECT event log files. This could enable unauthorized access to the proxy server.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-1495

The vulnerability, if exploited, could allow an attacker with Event Log Reader (S-1-5-32-573) privileges to obtain proxy details, including URL and proxy credentials, from the PI to CONNECT event log files. This could enable unauthorized access to the proxy server.

CVSS3: 6.5
0%
Низкий
2 дня назад
github логотип
GHSA-rj3h-xxg4-q2h4

The vulnerability, if exploited, could allow an attacker with Event Log Reader (S-1-5-32-573) privileges to obtain proxy details, including URL and proxy credentials, from the PI to CONNECT event log files. This could enable unauthorized access to the proxy server.

CVSS3: 6.5
0%
Низкий
2 дня назад

Уязвимостей на страницу