Логотип exploitDog
bind:CVE-2012-4362
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2012-4362

Количество 2

Количество 2

nvd логотип

CVE-2012-4362

больше 13 лет назад

hydra.exe in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance has a hardcoded password of L0CAlu53R for the global$agent account, which allows remote attackers to obtain access to a management service via a login: request to TCP port 13838.

CVSS2: 4
EPSS: Средний
github логотип

GHSA-8h29-3hc6-h9fv

больше 3 лет назад

hydra.exe in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance has a hardcoded password of L0CAlu53R for the global$agent account, which allows remote attackers to obtain access to a management service via a login: request to TCP port 13838.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2012-4362

hydra.exe in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance has a hardcoded password of L0CAlu53R for the global$agent account, which allows remote attackers to obtain access to a management service via a login: request to TCP port 13838.

CVSS2: 4
24%
Средний
больше 13 лет назад
github логотип
GHSA-8h29-3hc6-h9fv

hydra.exe in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance has a hardcoded password of L0CAlu53R for the global$agent account, which allows remote attackers to obtain access to a management service via a login: request to TCP port 13838.

24%
Средний
больше 3 лет назад

Уязвимостей на страницу