Логотип exploitDog
bind:CVE-2024-3019
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-3019

Количество 14

Количество 14

ubuntu логотип

CVE-2024-3019

около 2 лет назад

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2024-3019

около 2 лет назад

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2024-3019

около 2 лет назад

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2024-3019

около 2 лет назад

A flaw was found in PCP. The default pmproxy configuration exposes the ...

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03233-1

7 месяцев назад

Security update for pcp

EPSS: Низкий
rocky логотип

RLSA-2024:3264

почти 2 года назад

Important: pcp security update

EPSS: Низкий
rocky логотип

RLSA-2024:2566

почти 2 года назад

Important: pcp security, bug fix, and enhancement update

EPSS: Низкий
github логотип

GHSA-g58w-wr93-q367

около 2 лет назад

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
EPSS: Низкий
oracle-oval логотип

ELSA-2024-3264

почти 2 года назад

ELSA-2024-3264: pcp security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2566

почти 2 года назад

ELSA-2024-2566: pcp security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2024-02823

около 2 лет назад

Уязвимость компонента pmproxy программного обеспечения мониторинга и визуализация производительности Performance Co-Pilot (PCP), позволяющая нарушителю выполнять произвольные команды

CVSS3: 9.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3976-1

больше 1 года назад

Security update for pcp

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3533-1

больше 1 года назад

Security update for pcp

EPSS: Низкий
redos логотип

ROS-20240904-14

больше 1 года назад

Множественные уязвимости pcp

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-3019

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2024-3019

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2024-3019

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
0%
Низкий
около 2 лет назад
debian логотип
CVE-2024-3019

A flaw was found in PCP. The default pmproxy configuration exposes the ...

CVSS3: 8.8
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2025:03233-1

Security update for pcp

0%
Низкий
7 месяцев назад
rocky логотип
RLSA-2024:3264

Important: pcp security update

0%
Низкий
почти 2 года назад
rocky логотип
RLSA-2024:2566

Important: pcp security, bug fix, and enhancement update

0%
Низкий
почти 2 года назад
github логотип
GHSA-g58w-wr93-q367

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS3: 8.8
0%
Низкий
около 2 лет назад
oracle-oval логотип
ELSA-2024-3264

ELSA-2024-3264: pcp security update (IMPORTANT)

почти 2 года назад
oracle-oval логотип
ELSA-2024-2566

ELSA-2024-2566: pcp security, bug fix, and enhancement update (IMPORTANT)

почти 2 года назад
fstec логотип
BDU:2024-02823

Уязвимость компонента pmproxy программного обеспечения мониторинга и визуализация производительности Performance Co-Pilot (PCP), позволяющая нарушителю выполнять произвольные команды

CVSS3: 9.8
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:3976-1

Security update for pcp

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3533-1

Security update for pcp

больше 1 года назад
redos логотип
ROS-20240904-14

Множественные уязвимости pcp

CVSS3: 9.8
больше 1 года назад

Уязвимостей на страницу