Логотип exploitDog
bind:CVE-2020-10710
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-10710

Количество 3

Количество 3

redhat логотип

CVE-2020-10710

около 4 лет назад

A flaw was found where the Plaintext Candlepin password is disclosed while updating Red Hat Satellite through the satellite-installer. This flaw allows an attacker with sufficiently high privileges, such as root, to retrieve the Candlepin plaintext password.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2020-10710

больше 3 лет назад

A flaw was found where the Plaintext Candlepin password is disclosed while updating Red Hat Satellite through the satellite-installer. This flaw allows an attacker with sufficiently high privileges, such as root, to retrieve the Candlepin plaintext password.

CVSS3: 4.4
EPSS: Низкий
github логотип

GHSA-h75h-w5qg-cx2h

больше 3 лет назад

A flaw was found where the Plaintext Candlepin password is disclosed while updating Red Hat Satellite through the satellite-installer. This flaw allows an attacker with sufficiently high privileges, such as root, to retrieve the Candlepin plaintext password.

CVSS3: 4.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2020-10710

A flaw was found where the Plaintext Candlepin password is disclosed while updating Red Hat Satellite through the satellite-installer. This flaw allows an attacker with sufficiently high privileges, such as root, to retrieve the Candlepin plaintext password.

CVSS3: 5.3
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2020-10710

A flaw was found where the Plaintext Candlepin password is disclosed while updating Red Hat Satellite through the satellite-installer. This flaw allows an attacker with sufficiently high privileges, such as root, to retrieve the Candlepin plaintext password.

CVSS3: 4.4
0%
Низкий
больше 3 лет назад
github логотип
GHSA-h75h-w5qg-cx2h

A flaw was found where the Plaintext Candlepin password is disclosed while updating Red Hat Satellite through the satellite-installer. This flaw allows an attacker with sufficiently high privileges, such as root, to retrieve the Candlepin plaintext password.

CVSS3: 4.4
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу