Логотип exploitDog
bind:"BDU:2024-02823" OR bind:"CVE-2024-3019"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-02823" OR bind:"CVE-2024-3019"

Количество 13

Количество 13

fstec логотип

BDU:2024-02823

больше 1 года назад

Уязвимость компонента pmproxy программного обеспечения мониторинга и визуализация производительности Performance Co-Pilot (PCP), позволяющая нарушителю выполнять произвольные команды

CVSS3: 9.8
EPSS: Низкий
redos логотип

ROS-20240904-14

10 месяцев назад

Множественные уязвимости pcp

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2024-3019

около 1 года назад

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2024-3019

больше 1 года назад

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2024-3019

около 1 года назад

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2024-3019

около 1 года назад

A flaw was found in PCP. The default pmproxy configuration exposes the ...

CVSS3: 8.8
EPSS: Низкий
rocky логотип

RLSA-2024:3264

около 1 года назад

Important: pcp security update

EPSS: Низкий
rocky логотип

RLSA-2024:2566

около 1 года назад

Important: pcp security, bug fix, and enhancement update

EPSS: Низкий
github логотип

GHSA-g58w-wr93-q367

около 1 года назад

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
EPSS: Низкий
oracle-oval логотип

ELSA-2024-3264

около 1 года назад

ELSA-2024-3264: pcp security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2566

около 1 года назад

ELSA-2024-2566: pcp security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3976-1

8 месяцев назад

Security update for pcp

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3533-1

9 месяцев назад

Security update for pcp

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-02823

Уязвимость компонента pmproxy программного обеспечения мониторинга и визуализация производительности Performance Co-Pilot (PCP), позволяющая нарушителю выполнять произвольные команды

CVSS3: 9.8
0%
Низкий
больше 1 года назад
redos логотип
ROS-20240904-14

Множественные уязвимости pcp

CVSS3: 9.8
10 месяцев назад
ubuntu логотип
CVE-2024-3019

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-3019

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-3019

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-3019

A flaw was found in PCP. The default pmproxy configuration exposes the ...

CVSS3: 8.8
0%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:3264

Important: pcp security update

0%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:2566

Important: pcp security, bug fix, and enhancement update

0%
Низкий
около 1 года назад
github логотип
GHSA-g58w-wr93-q367

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
0%
Низкий
около 1 года назад
oracle-oval логотип
ELSA-2024-3264

ELSA-2024-3264: pcp security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-2566

ELSA-2024-2566: pcp security, bug fix, and enhancement update (IMPORTANT)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3976-1

Security update for pcp

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3533-1

Security update for pcp

9 месяцев назад

Уязвимостей на страницу