Логотип exploitDog
bind:CVE-2016-5722
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-5722

Количество 2

Количество 2

nvd логотип

CVE-2016-5722

больше 9 лет назад

Huawei OceanStor 5300 V3, 5500 V3, 5600 V3, 5800 V3, 6800 V3, 18800 V3, and 18500 V3 before V300R003C10 sends the plaintext session token in the HTTP header, which allows remote attackers to conduct replay attacks and obtain sensitive information by sniffing the network.

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-wxj5-3w49-r522

больше 3 лет назад

Huawei OceanStor 5300 V3, 5500 V3, 5600 V3, 5800 V3, 6800 V3, 18800 V3, and 18500 V3 before V300R003C10 sends the plaintext session token in the HTTP header, which allows remote attackers to conduct replay attacks and obtain sensitive information by sniffing the network.

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-5722

Huawei OceanStor 5300 V3, 5500 V3, 5600 V3, 5800 V3, 6800 V3, 18800 V3, and 18500 V3 before V300R003C10 sends the plaintext session token in the HTTP header, which allows remote attackers to conduct replay attacks and obtain sensitive information by sniffing the network.

CVSS3: 7.3
0%
Низкий
больше 9 лет назад
github логотип
GHSA-wxj5-3w49-r522

Huawei OceanStor 5300 V3, 5500 V3, 5600 V3, 5800 V3, 6800 V3, 18800 V3, and 18500 V3 before V300R003C10 sends the plaintext session token in the HTTP header, which allows remote attackers to conduct replay attacks and obtain sensitive information by sniffing the network.

CVSS3: 7.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу