Логотип exploitDog
bind:CVE-2022-2366
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-2366

Количество 3

Количество 3

nvd логотип

CVE-2022-2366

больше 3 лет назад

Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.

CVSS3: 5.6
EPSS: Низкий
debian логотип

CVE-2022-2366

больше 3 лет назад

Incorrect default configuration for trusted IP header in Mattermost ve ...

CVSS3: 5.6
EPSS: Низкий
github логотип

GHSA-8xxp-2g7w-ph6m

больше 3 лет назад

Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-2366

Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.

CVSS3: 5.6
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2022-2366

Incorrect default configuration for trusted IP header in Mattermost ve ...

CVSS3: 5.6
0%
Низкий
больше 3 лет назад
github логотип
GHSA-8xxp-2g7w-ph6m

Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу