Логотип exploitDog
bind:CVE-2019-17393
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-17393

Количество 2

Количество 2

nvd логотип

CVE-2019-17393

больше 6 лет назад

The Customer's Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors. Basic authentication is used for the authentication, making it possible to base64 decode the sniffed credentials and discover the username and password.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-49wh-vw4x-p83m

больше 3 лет назад

The Customer's Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors. Basic authentication is used for the authentication, making it possible to base64 decode the sniffed credentials and discover the username and password.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-17393

The Customer's Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors. Basic authentication is used for the authentication, making it possible to base64 decode the sniffed credentials and discover the username and password.

CVSS3: 9.8
0%
Низкий
больше 6 лет назад
github логотип
GHSA-49wh-vw4x-p83m

The Customer's Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors. Basic authentication is used for the authentication, making it possible to base64 decode the sniffed credentials and discover the username and password.

CVSS3: 9.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу