Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-878w-8w5v-4v3j

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.

wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.

EPSS

Процентиль: 8%
0.00033
Низкий

Связанные уязвимости

ubuntu
около 21 года назад

wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.

redhat
больше 21 года назад

wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.

nvd
около 21 года назад

wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.

debian
около 21 года назад

wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, all ...

EPSS

Процентиль: 8%
0.00033
Низкий