Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v526-5wc6-v9fv

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

NuFW 2.2.3, and certain other versions after 2.0, allows remote attackers to bypass time-based packet filtering rules via certain "out of period" choices of packet transmission time.

NuFW 2.2.3, and certain other versions after 2.0, allows remote attackers to bypass time-based packet filtering rules via certain "out of period" choices of packet transmission time.

EPSS

Процентиль: 49%
0.00262
Низкий

Связанные уязвимости

ubuntu
около 18 лет назад

NuFW 2.2.3, and certain other versions after 2.0, allows remote attackers to bypass time-based packet filtering rules via certain "out of period" choices of packet transmission time.

nvd
около 18 лет назад

NuFW 2.2.3, and certain other versions after 2.0, allows remote attackers to bypass time-based packet filtering rules via certain "out of period" choices of packet transmission time.

debian
около 18 лет назад

NuFW 2.2.3, and certain other versions after 2.0, allows remote attack ...

EPSS

Процентиль: 49%
0.00262
Низкий