Логотип exploitDog
bind:CVE-2018-10024
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-10024

Количество 2

Количество 2

nvd логотип

CVE-2018-10024

почти 8 лет назад

ubiQuoss Switch VP5208A creates a bcm_password file at /cgi-bin/ with the user credentials in cleartext when a failed login attempt occurs. The file can be reached via an HTTP request. The credentials can be used to access the system via SSH (or TELNET if it is enabled).

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-fj8w-49wh-xf78

больше 3 лет назад

ubiQuoss Switch VP5208A creates a bcm_password file at /cgi-bin/ with the user credentials in cleartext when a failed login attempt occurs. The file can be reached via an HTTP request. The credentials can be used to access the system via SSH (or TELNET if it is enabled).

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-10024

ubiQuoss Switch VP5208A creates a bcm_password file at /cgi-bin/ with the user credentials in cleartext when a failed login attempt occurs. The file can be reached via an HTTP request. The credentials can be used to access the system via SSH (or TELNET if it is enabled).

CVSS3: 9.8
1%
Низкий
почти 8 лет назад
github логотип
GHSA-fj8w-49wh-xf78

ubiQuoss Switch VP5208A creates a bcm_password file at /cgi-bin/ with the user credentials in cleartext when a failed login attempt occurs. The file can be reached via an HTTP request. The credentials can be used to access the system via SSH (or TELNET if it is enabled).

CVSS3: 9.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу