Логотип exploitDog
bind:CVE-2022-24633
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-24633

Количество 2

Количество 2

nvd логотип

CVE-2022-24633

почти 4 года назад

All versions of FileCloud prior to 21.3 are vulnerable to user enumeration. The vulnerability exists in the parameter "path" passing "/SHARED/<username>". A malicious actor could identify the existence of users by requesting share information on specified share paths.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-2gqp-7qqf-5rcq

почти 4 года назад

All versions of FileCloud prior to 21.3 are vulnerable to user enumeration. The vulnerability exists in the parameter "path" passing "/SHARED/<username>". A malicious actor could identify the existence of users by requesting share information on specified share paths.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-24633

All versions of FileCloud prior to 21.3 are vulnerable to user enumeration. The vulnerability exists in the parameter "path" passing "/SHARED/<username>". A malicious actor could identify the existence of users by requesting share information on specified share paths.

CVSS3: 5.3
0%
Низкий
почти 4 года назад
github логотип
GHSA-2gqp-7qqf-5rcq

All versions of FileCloud prior to 21.3 are vulnerable to user enumeration. The vulnerability exists in the parameter "path" passing "/SHARED/<username>". A malicious actor could identify the existence of users by requesting share information on specified share paths.

0%
Низкий
почти 4 года назад

Уязвимостей на страницу