2 vulnerabilities classified as CWE-528 (将CoreDump文件暴露给非授权控制范围). AI Chinese analysis included.
CWE-528 represents a critical information exposure weakness where software inadvertently generates core dump files containing sensitive data, such as memory contents and stack traces, and stores them in locations accessible to unauthorized actors. Attackers typically exploit this vulnerability by locating these dump files, often in default or poorly secured directories, to extract credentials, session tokens, or proprietary algorithmic logic embedded within the process memory. This exposure can lead to severe confidentiality breaches, enabling further attacks like privilege escalation or reverse engineering. To mitigate this risk, developers must configure systems to restrict core dump generation, ensuring they are stored only in highly secured, access-controlled directories. Additionally, implementing automatic deletion policies and auditing file permissions are essential practices to prevent unauthorized access to these potentially sensitive artifacts.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-48928 | TeleMessage 安全漏洞 — service | 4.0 | Medium | 2025-05-28 |
| CVE-2024-10403 | SFTP/FTP password could be captured in plain text in Supportsave generated from SANnav — Fabric OS | 6.5AI | MediumAI | 2024-11-21 |
Vulnerabilities classified as CWE-528 (将CoreDump文件暴露给非授权控制范围) represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.