Количество 43
Количество 43

CVE-2021-23192
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVE-2021-23192
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVE-2021-23192
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVE-2021-23192
CVE-2021-23192
A flaw was found in the way samba implemented DCE/RPC. If a client to ...

CVE-2020-25717
A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.

CVE-2020-25717
A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.

CVE-2020-25717
A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.

CVE-2020-25717
CVE-2020-25717
A flaw was found in the way Samba maps domain users to local users. An ...
GHSA-vffc-r23p-p6rq
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

BDU:2022-05707
Уязвимость компонентов DCE/RPC пакета программ сетевого взаимодействия Samba, позволяющая нарушителю оказать воздействие на целостность данных

openSUSE-SU-2021:3662-1
Security update for samba

SUSE-SU-2021:3662-1
Security update for samba

SUSE-RU-2021:4173-2
Recommended update for samba

SUSE-RU-2021:4173-1
Recommended update for samba

SUSE-RU-2021:4149-1
Recommended update for samba

SUSE-RU-2021:4127-1
Recommended update for samba

SUSE-RU-2021:4126-1
Recommended update for samba

SUSE-RU-2021:4117-1
Recommended update for samba
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-23192 A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-23192 A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements. | CVSS3: 4.8 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-23192 A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад |
![]() | CVSS3: 7.5 | 0% Низкий | 8 месяцев назад | |
CVE-2021-23192 A flaw was found in the way samba implemented DCE/RPC. If a client to ... | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
![]() | CVE-2020-25717 A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation. | CVSS3: 8.1 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2020-25717 A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation. | CVSS3: 8.1 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2020-25717 A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation. | CVSS3: 8.1 | 0% Низкий | больше 3 лет назад |
![]() | CVSS3: 8.1 | 0% Низкий | 8 месяцев назад | |
CVE-2020-25717 A flaw was found in the way Samba maps domain users to local users. An ... | CVSS3: 8.1 | 0% Низкий | больше 3 лет назад | |
GHSA-vffc-r23p-p6rq A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
![]() | BDU:2022-05707 Уязвимость компонентов DCE/RPC пакета программ сетевого взаимодействия Samba, позволяющая нарушителю оказать воздействие на целостность данных | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад |
![]() | openSUSE-SU-2021:3662-1 Security update for samba | 0% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2021:3662-1 Security update for samba | 0% Низкий | больше 3 лет назад | |
![]() | SUSE-RU-2021:4173-2 Recommended update for samba | 0% Низкий | больше 3 лет назад | |
![]() | SUSE-RU-2021:4173-1 Recommended update for samba | 0% Низкий | больше 3 лет назад | |
![]() | SUSE-RU-2021:4149-1 Recommended update for samba | 0% Низкий | больше 3 лет назад | |
![]() | SUSE-RU-2021:4127-1 Recommended update for samba | 0% Низкий | больше 3 лет назад | |
![]() | SUSE-RU-2021:4126-1 Recommended update for samba | 0% Низкий | больше 3 лет назад | |
![]() | SUSE-RU-2021:4117-1 Recommended update for samba | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу