漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Vasion Print (formerly PrinterLogic) Readable Cleartext Passwords
Vulnerability Description
Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store a large number of sensitive credentials (database passwords, MySQL root password, SaaS keys, Portainer admin password, etc.) in cleartext files that are world-readable. Any local user - or any process that can read the host filesystem - can retrieve all of these secrets in plain text, leading to credential theft and full compromise of the appliance. The vendor does not consider this to be a security vulnerability as this product "follows a shared responsibility model, where administrators are expected to configure persistent storage encryption."
CVSS Information
N/A
Vulnerability Type
明文存储口令
Vulnerability Title
Vasion Print Virtual Appliance Host和Vasion Print Application 安全漏洞
Vulnerability Description
Vasion Print Virtual Appliance Host和Vasion Print Application都是美国Vasion公司的产品。Vasion Print Virtual Appliance Host是一个打印管理软件。Vasion Print Application是一个打印机管理应用程序。 Vasion Print Virtual Appliance Host和Vasion Print Application存在安全漏洞,该漏洞源于以明文形式存储敏感凭据,可能导致凭据窃取和设备完
CVSS Information
N/A
Vulnerability Type
N/A