Описание
gPS before 1.1.0 does not properly follow the rgpsp connection source acceptation policy as specified in the rgpsp.conf file, which could allow unauthorized remote attackers to connect to rgpsp.
Ссылки
- Patch
- PatchVendor Advisory
- Patch
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:debian:debian_linux:0.9.1:*:woody_gps_package:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:0.9.2:*:woody_gps_package:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:0.9.3:*:woody_gps_package:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:0.9.4:*:woody_gps_package:*:*:*:*:*
EPSS
Процентиль: 69%
0.00636
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
debian
около 22 лет назад
gPS before 1.1.0 does not properly follow the rgpsp connection source ...
github
больше 3 лет назад
gPS before 1.1.0 does not properly follow the rgpsp connection source acceptation policy as specified in the rgpsp.conf file, which could allow unauthorized remote attackers to connect to rgpsp.
EPSS
Процентиль: 69%
0.00636
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other