Количество 44
Количество 44
BDU:2021-05993
Уязвимость реализации протокола SMB1 пакета программ сетевого взаимодействия Samba, связанная с возможностью перевода клиентского соединения на аутентификацию с открытым текстом, позволяющая нарушителю выполнить атаку типа «человек посередине»
CVE-2021-23192
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
CVE-2021-23192
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
CVE-2021-23192
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
CVE-2021-23192
CVE-2021-23192
A flaw was found in the way samba implemented DCE/RPC. If a client to ...
CVE-2020-25717
A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.
CVE-2020-25717
A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.
CVE-2020-25717
A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.
CVE-2020-25717
CVE-2020-25717
A flaw was found in the way Samba maps domain users to local users. An ...
GHSA-vffc-r23p-p6rq
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
BDU:2022-05707
Уязвимость компонентов DCE/RPC пакета программ сетевого взаимодействия Samba, позволяющая нарушителю оказать воздействие на целостность данных
openSUSE-SU-2021:3662-1
Security update for samba
SUSE-SU-2021:3662-1
Security update for samba
SUSE-RU-2021:4173-2
Recommended update for samba
SUSE-RU-2021:4173-1
Recommended update for samba
SUSE-RU-2021:4149-1
Recommended update for samba
SUSE-RU-2021:4127-1
Recommended update for samba
SUSE-RU-2021:4126-1
Recommended update for samba
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2021-05993 Уязвимость реализации протокола SMB1 пакета программ сетевого взаимодействия Samba, связанная с возможностью перевода клиентского соединения на аутентификацию с открытым текстом, позволяющая нарушителю выполнить атаку типа «человек посередине» | CVSS3: 9.8 | 1% Низкий | около 9 лет назад | |
CVE-2021-23192 A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements. | CVSS3: 7.5 | 0% Низкий | почти 4 года назад | |
CVE-2021-23192 A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements. | CVSS3: 4.8 | 0% Низкий | около 4 лет назад | |
CVE-2021-23192 A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements. | CVSS3: 7.5 | 0% Низкий | почти 4 года назад | |
CVSS3: 7.5 | 0% Низкий | больше 1 года назад | ||
CVE-2021-23192 A flaw was found in the way samba implemented DCE/RPC. If a client to ... | CVSS3: 7.5 | 0% Низкий | почти 4 года назад | |
CVE-2020-25717 A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation. | CVSS3: 8.1 | 0% Низкий | почти 4 года назад | |
CVE-2020-25717 A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation. | CVSS3: 8.1 | 0% Низкий | около 4 лет назад | |
CVE-2020-25717 A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation. | CVSS3: 8.1 | 0% Низкий | почти 4 года назад | |
CVSS3: 8.1 | 0% Низкий | больше 1 года назад | ||
CVE-2020-25717 A flaw was found in the way Samba maps domain users to local users. An ... | CVSS3: 8.1 | 0% Низкий | почти 4 года назад | |
GHSA-vffc-r23p-p6rq A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements. | CVSS3: 7.5 | 0% Низкий | почти 4 года назад | |
BDU:2022-05707 Уязвимость компонентов DCE/RPC пакета программ сетевого взаимодействия Samba, позволяющая нарушителю оказать воздействие на целостность данных | CVSS3: 7.5 | 0% Низкий | больше 4 лет назад | |
openSUSE-SU-2021:3662-1 Security update for samba | 0% Низкий | около 4 лет назад | ||
SUSE-SU-2021:3662-1 Security update for samba | 0% Низкий | около 4 лет назад | ||
SUSE-RU-2021:4173-2 Recommended update for samba | 0% Низкий | около 4 лет назад | ||
SUSE-RU-2021:4173-1 Recommended update for samba | 0% Низкий | около 4 лет назад | ||
SUSE-RU-2021:4149-1 Recommended update for samba | 0% Низкий | около 4 лет назад | ||
SUSE-RU-2021:4127-1 Recommended update for samba | 0% Низкий | около 4 лет назад | ||
SUSE-RU-2021:4126-1 Recommended update for samba | 0% Низкий | около 4 лет назад |
Уязвимостей на страницу