Логотип exploitDog
bind:CVE-1999-0710
Консоль
Логотип exploitDog

exploitDog

bind:CVE-1999-0710

Количество 4

Количество 4

redhat логотип

CVE-1999-0710

почти 26 лет назад

The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.

EPSS: Средний
nvd логотип

CVE-1999-0710

почти 26 лет назад

The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.

CVSS2: 7.5
EPSS: Средний
debian логотип

CVE-1999-0710

почти 26 лет назад

The Squid package in Red Hat Linux 5.2 and 6.0, and other distribution ...

CVSS2: 7.5
EPSS: Средний
github логотип

GHSA-qhrx-x4p7-jr4j

около 3 лет назад

The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-1999-0710

The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.

13%
Средний
почти 26 лет назад
nvd логотип
CVE-1999-0710

The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.

CVSS2: 7.5
13%
Средний
почти 26 лет назад
debian логотип
CVE-1999-0710

The Squid package in Red Hat Linux 5.2 and 6.0, and other distribution ...

CVSS2: 7.5
13%
Средний
почти 26 лет назад
github логотип
GHSA-qhrx-x4p7-jr4j

The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.

13%
Средний
около 3 лет назад

Уязвимостей на страницу