Логотип exploitDog
bind:CVE-2021-3037
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-3037

Количество 2

Количество 2

nvd логотип

CVE-2021-3037

почти 5 лет назад

An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server.

CVSS3: 2.3
EPSS: Низкий
github логотип

GHSA-5jf9-w976-2jh9

больше 3 лет назад

An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server.

CVSS3: 2.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-3037

An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server.

CVSS3: 2.3
0%
Низкий
почти 5 лет назад
github логотип
GHSA-5jf9-w976-2jh9

An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server.

CVSS3: 2.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу