Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8cph-r8x9-fxx9

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.

OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.

EPSS

Процентиль: 21%
0.00068
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.

redhat
около 17 лет назад

OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.

nvd
около 17 лет назад

OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.

debian
около 17 лет назад

OpenSC before 0.11.5 uses weak permissions (ADMIN file control informa ...

fstec
почти 17 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая злоумышленнику нарушить целостность защищаемой информации

EPSS

Процентиль: 21%
0.00068
Низкий