Логотип exploitDog
bind:CVE-2022-24414
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-24414

Количество 2

Количество 2

nvd логотип

CVE-2022-24414

больше 3 лет назад

Dell EMC CloudLink 7.1.3 and all earlier versions, Auth Token is exposed in GET requests. These request parameters can get logged in reverse proxies and server logs. Attackers may potentially use these tokens to access CloudLink server. Tokens should not be used in request URL to avoid such attacks.

CVSS3: 7.6
EPSS: Низкий
github логотип

GHSA-cvg9-qpjf-fv53

больше 3 лет назад

Dell EMC CloudLink 7.1.3 and all earlier versions, Auth Token is exposed in GET requests. These request parameters can get logged in reverse proxies and server logs. Attackers may potentially use these tokens to access CloudLink server. Tokens should not be used in request URL to avoid such attacks.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-24414

Dell EMC CloudLink 7.1.3 and all earlier versions, Auth Token is exposed in GET requests. These request parameters can get logged in reverse proxies and server logs. Attackers may potentially use these tokens to access CloudLink server. Tokens should not be used in request URL to avoid such attacks.

CVSS3: 7.6
0%
Низкий
больше 3 лет назад
github логотип
GHSA-cvg9-qpjf-fv53

Dell EMC CloudLink 7.1.3 and all earlier versions, Auth Token is exposed in GET requests. These request parameters can get logged in reverse proxies and server logs. Attackers may potentially use these tokens to access CloudLink server. Tokens should not be used in request URL to avoid such attacks.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу