Логотип exploitDog
bind:CVE-2018-20799
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-20799

Количество 2

Количество 2

nvd логотип

CVE-2018-20799

почти 7 лет назад

In pfSense 2.4.4_1, blocking of source IP addresses on the basis of failed HTTPS authentication is inconsistent with blocking of source IP addresses on the basis of failed SSH authentication (the behavior does not match the sshguard documentation), which might make it easier for attackers to bypass intended access restrictions.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-556r-ph87-2m55

больше 3 лет назад

In pfSense 2.4.4_1, blocking of source IP addresses on the basis of failed HTTPS authentication is inconsistent with blocking of source IP addresses on the basis of failed SSH authentication (the behavior does not match the sshguard documentation), which might make it easier for attackers to bypass intended access restrictions.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-20799

In pfSense 2.4.4_1, blocking of source IP addresses on the basis of failed HTTPS authentication is inconsistent with blocking of source IP addresses on the basis of failed SSH authentication (the behavior does not match the sshguard documentation), which might make it easier for attackers to bypass intended access restrictions.

CVSS3: 7.5
0%
Низкий
почти 7 лет назад
github логотип
GHSA-556r-ph87-2m55

In pfSense 2.4.4_1, blocking of source IP addresses on the basis of failed HTTPS authentication is inconsistent with blocking of source IP addresses on the basis of failed SSH authentication (the behavior does not match the sshguard documentation), which might make it easier for attackers to bypass intended access restrictions.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу