Логотип exploitDog
bind:CVE-2020-17383
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-17383

Количество 2

Количество 2

nvd логотип

CVE-2020-17383

около 4 лет назад

A directory traversal vulnerability on Telos Z/IP One devices through 4.0.0r grants an unauthenticated individual root level access to the device's file system. This can be used to identify configuration settings, password hashes for built-in accounts, and the cleartext password for remote configuration of the device through the WebUI.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-72j5-838x-5995

около 4 лет назад

A directory traversal vulnerability on Telos Z/IP One devices through 4.0.0r grants an unauthenticated individual root level access to the device's file system. This can be used to identify configuration settings, password hashes for built-in accounts, and the cleartext password for remote configuration of the device through the WebUI.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-17383

A directory traversal vulnerability on Telos Z/IP One devices through 4.0.0r grants an unauthenticated individual root level access to the device's file system. This can be used to identify configuration settings, password hashes for built-in accounts, and the cleartext password for remote configuration of the device through the WebUI.

CVSS3: 9.8
6%
Низкий
около 4 лет назад
github логотип
GHSA-72j5-838x-5995

A directory traversal vulnerability on Telos Z/IP One devices through 4.0.0r grants an unauthenticated individual root level access to the device's file system. This can be used to identify configuration settings, password hashes for built-in accounts, and the cleartext password for remote configuration of the device through the WebUI.

6%
Низкий
около 4 лет назад

Уязвимостей на страницу