Логотип exploitDog
bind:"CVE-2018-1000119" OR bind:"CVE-2018-1086" OR bind:"CVE-2018-1079"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-1000119" OR bind:"CVE-2018-1086" OR bind:"CVE-2018-1079"

Количество 17

Количество 17

oracle-oval логотип

ELSA-2018-1060

почти 8 лет назад

ELSA-2018-1060: pcs security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2018-1000119

почти 8 лет назад

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2018-1000119

больше 10 лет назад

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2018-1000119

почти 8 лет назад

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2018-1000119

почти 8 лет назад

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier conta ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-688c-3x49-6rqj

почти 8 лет назад

rack-protection gem timing attack vulnerability when validating CSRF token

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2019-00439

почти 8 лет назад

Уязвимость механизма защиты «rack-protection» фреймворка Sinatra для разработки веб-приложений на языке программирования Ruby, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2018-1086

почти 8 лет назад

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2018-1086

почти 8 лет назад

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2018-1086

почти 8 лет назад

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2018-1086

почти 8 лет назад

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug paramete ...

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2018-1079

почти 8 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
EPSS: Низкий
redhat логотип

CVE-2018-1079

почти 8 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
EPSS: Низкий
nvd логотип

CVE-2018-1079

почти 8 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
EPSS: Низкий
debian логотип

CVE-2018-1079

почти 8 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escal ...

CVSS3: 8.7
EPSS: Низкий
github логотип

GHSA-wxjj-jh24-cx5f

больше 3 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-p9pc-vgv7-x9j9

больше 3 лет назад

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2018-1060

ELSA-2018-1060: pcs security update (IMPORTANT)

почти 8 лет назад
ubuntu логотип
CVE-2018-1000119

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.

CVSS3: 5.9
0%
Низкий
почти 8 лет назад
redhat логотип
CVE-2018-1000119

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.

CVSS3: 3.7
0%
Низкий
больше 10 лет назад
nvd логотип
CVE-2018-1000119

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.

CVSS3: 5.9
0%
Низкий
почти 8 лет назад
debian логотип
CVE-2018-1000119

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier conta ...

CVSS3: 5.9
0%
Низкий
почти 8 лет назад
github логотип
GHSA-688c-3x49-6rqj

rack-protection gem timing attack vulnerability when validating CSRF token

CVSS3: 5.9
0%
Низкий
почти 8 лет назад
fstec логотип
BDU:2019-00439

Уязвимость механизма защиты «rack-protection» фреймворка Sinatra для разработки веб-приложений на языке программирования Ruby, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
0%
Низкий
почти 8 лет назад
ubuntu логотип
CVE-2018-1086

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 4.3
0%
Низкий
почти 8 лет назад
redhat логотип
CVE-2018-1086

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 4.3
0%
Низкий
почти 8 лет назад
nvd логотип
CVE-2018-1086

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 4.3
0%
Низкий
почти 8 лет назад
debian логотип
CVE-2018-1086

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug paramete ...

CVSS3: 4.3
0%
Низкий
почти 8 лет назад
ubuntu логотип
CVE-2018-1079

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
0%
Низкий
почти 8 лет назад
redhat логотип
CVE-2018-1079

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
0%
Низкий
почти 8 лет назад
nvd логотип
CVE-2018-1079

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
0%
Низкий
почти 8 лет назад
debian логотип
CVE-2018-1079

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escal ...

CVSS3: 8.7
0%
Низкий
почти 8 лет назад
github логотип
GHSA-wxjj-jh24-cx5f

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-p9pc-vgv7-x9j9

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу