Логотип exploitDog
bind:"CVE-2024-12087" OR bind:"CVE-2024-12088" OR bind:"CVE-2024-12747"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-12087" OR bind:"CVE-2024-12088" OR bind:"CVE-2024-12747"

Количество 31

Количество 31

rocky логотип

RLSA-2025:2600

около 1 месяца назад

Moderate: rsync security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7050

около 1 месяца назад

ELSA-2025-7050: rsync security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-2600

3 месяца назад

ELSA-2025-2600: rsync security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0166-1

5 месяцев назад

Security update for rsync

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0165-1

5 месяцев назад

Security update for rsync

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0157-1

5 месяцев назад

Security update for rsync

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0156-1

5 месяцев назад

Security update for rsync

EPSS: Низкий
redos логотип

ROS-20250203-04

5 месяцев назад

Множественные уязвимости rsync

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2024-12087

5 месяцев назад

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2024-12087

5 месяцев назад

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2024-12087

5 месяцев назад

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2024-12087

5 месяцев назад

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2024-12087

5 месяцев назад

A path traversal vulnerability exists in rsync. It stems from behavior ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-9x68-7qq6-v523

5 месяцев назад

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2025-00377

7 месяцев назад

Уязвимость конфигурации --inc-recursive демона rsyncd утилиты для передачи и синхронизации файлов Rsync, позволяющая нарушителю записывать произвольные файлы

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2024-12747

5 месяцев назад

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
EPSS: Низкий
redhat логотип

CVE-2024-12747

5 месяцев назад

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
EPSS: Низкий
nvd логотип

CVE-2024-12747

5 месяцев назад

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
EPSS: Низкий
msrc логотип

CVE-2024-12747

5 месяцев назад

CVSS3: 5.6
EPSS: Низкий
debian логотип

CVE-2024-12747

5 месяцев назад

A flaw was found in rsync. This vulnerability arises from a race condi ...

CVSS3: 5.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2025:2600

Moderate: rsync security update

около 1 месяца назад
oracle-oval логотип
ELSA-2025-7050

ELSA-2025-7050: rsync security update (MODERATE)

около 1 месяца назад
oracle-oval логотип
ELSA-2025-2600

ELSA-2025-2600: rsync security update (MODERATE)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0166-1

Security update for rsync

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0165-1

Security update for rsync

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0157-1

Security update for rsync

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0156-1

Security update for rsync

5 месяцев назад
redos логотип
ROS-20250203-04

Множественные уязвимости rsync

CVSS3: 9.8
5 месяцев назад
ubuntu логотип
CVE-2024-12087

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2024-12087

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2024-12087

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
0%
Низкий
5 месяцев назад
msrc логотип
CVSS3: 6.5
0%
Низкий
5 месяцев назад
debian логотип
CVE-2024-12087

A path traversal vulnerability exists in rsync. It stems from behavior ...

CVSS3: 6.5
0%
Низкий
5 месяцев назад
github логотип
GHSA-9x68-7qq6-v523

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

CVSS3: 6.5
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-00377

Уязвимость конфигурации --inc-recursive демона rsyncd утилиты для передачи и синхронизации файлов Rsync, позволяющая нарушителю записывать произвольные файлы

CVSS3: 6.5
0%
Низкий
7 месяцев назад
ubuntu логотип
CVE-2024-12747

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2024-12747

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2024-12747

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
0%
Низкий
5 месяцев назад
msrc логотип
CVSS3: 5.6
0%
Низкий
5 месяцев назад
debian логотип
CVE-2024-12747

A flaw was found in rsync. This vulnerability arises from a race condi ...

CVSS3: 5.6
0%
Низкий
5 месяцев назад

Уязвимостей на страницу