Логотип exploitDog
bind:CVE-2008-3830
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2008-3830

Количество 4

Количество 4

redhat логотип

CVE-2008-3830

почти 17 лет назад

Condor before 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows attackers to bypass intended access restrictions.

EPSS: Низкий
nvd логотип

CVE-2008-3830

почти 17 лет назад

Condor before 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows attackers to bypass intended access restrictions.

CVSS2: 7.2
EPSS: Низкий
debian логотип

CVE-2008-3830

почти 17 лет назад

Condor before 7.0.5 does not properly handle when the configuration sp ...

CVSS2: 7.2
EPSS: Низкий
github логотип

GHSA-x3pw-4w9m-43c6

больше 3 лет назад

Condor before 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows attackers to bypass intended access restrictions.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2008-3830

Condor before 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows attackers to bypass intended access restrictions.

0%
Низкий
почти 17 лет назад
nvd логотип
CVE-2008-3830

Condor before 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows attackers to bypass intended access restrictions.

CVSS2: 7.2
0%
Низкий
почти 17 лет назад
debian логотип
CVE-2008-3830

Condor before 7.0.5 does not properly handle when the configuration sp ...

CVSS2: 7.2
0%
Низкий
почти 17 лет назад
github логотип
GHSA-x3pw-4w9m-43c6

Condor before 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows attackers to bypass intended access restrictions.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу