Логотип exploitDog
bind:CVE-2020-10590
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-10590

Количество 2

Количество 2

nvd логотип

CVE-2020-10590

больше 4 лет назад

Replicated Classic 2.x versions have an improperly secured API that exposes sensitive data from the Replicated Admin Console configuration. An attacker with network access to the Admin Console port (8800) on the Replicated Classic server could retrieve the TLS Keypair (Cert and Key) used to configure the Admin Console.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-565m-cfpg-xcjr

больше 3 лет назад

Replicated Classic 2.x versions have an improperly secured API that exposes sensitive data from the Replicated Admin Console configuration. An attacker with network access to the Admin Console port (8800) on the Replicated Classic server could retrieve the TLS Keypair (Cert and Key) used to configure the Admin Console.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-10590

Replicated Classic 2.x versions have an improperly secured API that exposes sensitive data from the Replicated Admin Console configuration. An attacker with network access to the Admin Console port (8800) on the Replicated Classic server could retrieve the TLS Keypair (Cert and Key) used to configure the Admin Console.

CVSS3: 7.5
0%
Низкий
больше 4 лет назад
github логотип
GHSA-565m-cfpg-xcjr

Replicated Classic 2.x versions have an improperly secured API that exposes sensitive data from the Replicated Admin Console configuration. An attacker with network access to the Admin Console port (8800) on the Replicated Classic server could retrieve the TLS Keypair (Cert and Key) used to configure the Admin Console.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу