Количество 14
Количество 14
GHSA-mjxr-7f24-c564
An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.
CVE-2020-35458
An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.
CVE-2020-35458
An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There ...
openSUSE-SU-2021:0147-1
Security update for hawk2
openSUSE-SU-2021:0144-1
Security update for hawk2
openSUSE-SU-2021:0074-1
Security update for hawk2
openSUSE-SU-2021:0054-1
Security update for hawk2
SUSE-SU-2021:0200-1
Security update for hawk2
SUSE-SU-2021:0198-1
Security update for hawk2
SUSE-SU-2021:0192-1
Security update for hawk2
SUSE-SU-2021:0090-1
Security update for hawk2
SUSE-SU-2021:0089-1
Security update for hawk2
SUSE-SU-2021:0088-1
Security update for hawk2
BDU:2022-07038
Уязвимость графического веб-интерфейса для управления и мониторинга кластеров ClusterLabs Hawk, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-mjxr-7f24-c564 An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser. | 13% Средний | больше 3 лет назад | ||
CVE-2020-35458 An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser. | CVSS3: 9.8 | 13% Средний | около 5 лет назад | |
CVE-2020-35458 An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There ... | CVSS3: 9.8 | 13% Средний | около 5 лет назад | |
openSUSE-SU-2021:0147-1 Security update for hawk2 | 13% Средний | около 5 лет назад | ||
openSUSE-SU-2021:0144-1 Security update for hawk2 | 13% Средний | около 5 лет назад | ||
openSUSE-SU-2021:0074-1 Security update for hawk2 | 13% Средний | около 5 лет назад | ||
openSUSE-SU-2021:0054-1 Security update for hawk2 | 13% Средний | около 5 лет назад | ||
SUSE-SU-2021:0200-1 Security update for hawk2 | 13% Средний | около 5 лет назад | ||
SUSE-SU-2021:0198-1 Security update for hawk2 | 13% Средний | около 5 лет назад | ||
SUSE-SU-2021:0192-1 Security update for hawk2 | 13% Средний | около 5 лет назад | ||
SUSE-SU-2021:0090-1 Security update for hawk2 | 13% Средний | около 5 лет назад | ||
SUSE-SU-2021:0089-1 Security update for hawk2 | 13% Средний | около 5 лет назад | ||
SUSE-SU-2021:0088-1 Security update for hawk2 | 13% Средний | около 5 лет назад | ||
BDU:2022-07038 Уязвимость графического веб-интерфейса для управления и мониторинга кластеров ClusterLabs Hawk, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 13% Средний | около 5 лет назад |
Уязвимостей на страницу