Логотип exploitDog
bind:CVE-2010-2465
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2010-2465

Количество 2

Количество 2

nvd логотип

CVE-2010-2465

больше 15 лет назад

The S2 Security NetBox 2.5, 3.3, and 4.0, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download node logs, photographs of persons, and backup files via unspecified HTTP requests.

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-5g4m-m8fw-qv8h

больше 3 лет назад

The S2 Security NetBox 2.5, 3.3, and 4.0, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download node logs, photographs of persons, and backup files via unspecified HTTP requests.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2010-2465

The S2 Security NetBox 2.5, 3.3, and 4.0, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download node logs, photographs of persons, and backup files via unspecified HTTP requests.

CVSS2: 5
2%
Низкий
больше 15 лет назад
github логотип
GHSA-5g4m-m8fw-qv8h

The S2 Security NetBox 2.5, 3.3, and 4.0, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download node logs, photographs of persons, and backup files via unspecified HTTP requests.

2%
Низкий
больше 3 лет назад

Уязвимостей на страницу