Логотип exploitDog
bind:"CVE-2024-12087" OR bind:"CVE-2024-12088" OR bind:"CVE-2024-12747"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-12087" OR bind:"CVE-2024-12088" OR bind:"CVE-2024-12747"

Количество 33

Количество 33

rocky логотип

RLSA-2025:7050

4 месяца назад

Moderate: rsync security update

EPSS: Низкий
rocky логотип

RLSA-2025:2600

9 месяцев назад

Moderate: rsync security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7050

9 месяцев назад

ELSA-2025-7050: rsync security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-2600

11 месяцев назад

ELSA-2025-2600: rsync security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0166-1

около 1 года назад

Security update for rsync

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0165-1

около 1 года назад

Security update for rsync

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0157-1

около 1 года назад

Security update for rsync

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0156-1

около 1 года назад

Security update for rsync

EPSS: Низкий
redos логотип

ROS-20250203-04

около 1 года назад

Множественные уязвимости rsync

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2024-12087

около 1 года назад

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2024-12087

около 1 года назад

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2024-12087

около 1 года назад

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2024-12087

около 1 года назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-12087

около 1 года назад

A path traversal vulnerability exists in rsync. It stems from behavior ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-9x68-7qq6-v523

около 1 года назад

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
EPSS: Низкий
oracle-oval логотип

ELSA-2025-23415

около 1 месяца назад

ELSA-2025-23415: rsync security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2025-00377

около 1 года назад

Уязвимость конфигурации --inc-recursive демона rsyncd утилиты для передачи и синхронизации файлов Rsync, позволяющая нарушителю записывать произвольные файлы

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2024-12747

около 1 года назад

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
EPSS: Низкий
redhat логотип

CVE-2024-12747

около 1 года назад

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
EPSS: Низкий
nvd логотип

CVE-2024-12747

около 1 года назад

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2025:7050

Moderate: rsync security update

4 месяца назад
rocky логотип
RLSA-2025:2600

Moderate: rsync security update

9 месяцев назад
oracle-oval логотип
ELSA-2025-7050

ELSA-2025-7050: rsync security update (MODERATE)

9 месяцев назад
oracle-oval логотип
ELSA-2025-2600

ELSA-2025-2600: rsync security update (MODERATE)

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0166-1

Security update for rsync

около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0165-1

Security update for rsync

около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0157-1

Security update for rsync

около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0156-1

Security update for rsync

около 1 года назад
redos логотип
ROS-20250203-04

Множественные уязвимости rsync

CVSS3: 9.8
около 1 года назад
ubuntu логотип
CVE-2024-12087

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
2%
Низкий
около 1 года назад
redhat логотип
CVE-2024-12087

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
2%
Низкий
около 1 года назад
nvd логотип
CVE-2024-12087

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
2%
Низкий
около 1 года назад
msrc логотип
CVSS3: 7.5
2%
Низкий
около 1 года назад
debian логотип
CVE-2024-12087

A path traversal vulnerability exists in rsync. It stems from behavior ...

CVSS3: 6.5
2%
Низкий
около 1 года назад
github логотип
GHSA-9x68-7qq6-v523

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
2%
Низкий
около 1 года назад
oracle-oval логотип
ELSA-2025-23415

ELSA-2025-23415: rsync security update (MODERATE)

около 1 месяца назад
fstec логотип
BDU:2025-00377

Уязвимость конфигурации --inc-recursive демона rsyncd утилиты для передачи и синхронизации файлов Rsync, позволяющая нарушителю записывать произвольные файлы

CVSS3: 6.5
2%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-12747

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-12747

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-12747

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
0%
Низкий
около 1 года назад

Уязвимостей на страницу