Логотип exploitDog
bind:CVE-2024-1223
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-1223

Количество 2

Количество 2

nvd логотип

CVE-2024-1223

почти 2 года назад

This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.

CVSS3: 4.8
EPSS: Низкий
github логотип

GHSA-vfgc-wr54-m4r5

почти 2 года назад

This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.

CVSS3: 4.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-1223

This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.

CVSS3: 4.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-vfgc-wr54-m4r5

This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.

CVSS3: 4.8
0%
Низкий
почти 2 года назад

Уязвимостей на страницу