Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-263m-wcmp-r5j6

Опубликовано: 14 нояб. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 8.4
CVSS3: 0

Описание

A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.

A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.

EPSS

Процентиль: 1%
0.00011
Низкий

8.4 High

CVSS4

0 Low

CVSS3

Дефекты

CWE-190
CWE-305

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 1 года назад

A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.

CVSS3: 7.8
nvd
около 1 года назад

A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.

CVSS3: 7.8
debian
около 1 года назад

A local user can bypass the OpenAFS PAG (Process Authentication Group) ...

EPSS

Процентиль: 1%
0.00011
Низкий

8.4 High

CVSS4

0 Low

CVSS3

Дефекты

CWE-190
CWE-305