Количество 4
Количество 4
CVE-2012-4442
Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permission check.
CVE-2012-4442
Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permission check.
CVE-2012-4442
Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the ro ...
GHSA-g9q3-fr3w-j4gq
Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permission check.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2012-4442 Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permission check. | CVSS2: 4.7 | 0% Низкий | больше 13 лет назад | |
CVE-2012-4442 Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permission check. | CVSS2: 4.7 | 0% Низкий | больше 13 лет назад | |
CVE-2012-4442 Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the ro ... | CVSS2: 4.7 | 0% Низкий | больше 13 лет назад | |
GHSA-g9q3-fr3w-j4gq Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permission check. | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу