Описание
The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
EPSS
Процентиль: 8%
0.00029
Низкий
7.8 High
CVSS3
6.9 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
CVSS3: 7.3
redhat
больше 9 лет назад
The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.
CVSS3: 7.8
github
больше 3 лет назад
The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.
EPSS
Процентиль: 8%
0.00029
Низкий
7.8 High
CVSS3
6.9 Medium
CVSS2
Дефекты
CWE-20