Логотип exploitDog
bind:"CVE-2018-1000119" OR bind:"CVE-2018-1086" OR bind:"CVE-2018-1079"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-1000119" OR bind:"CVE-2018-1086" OR bind:"CVE-2018-1079"

Количество 17

Количество 17

oracle-oval логотип

ELSA-2018-1060

больше 7 лет назад

ELSA-2018-1060: pcs security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2018-1000119

больше 7 лет назад

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2018-1000119

больше 10 лет назад

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2018-1000119

больше 7 лет назад

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2018-1000119

больше 7 лет назад

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier conta ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-688c-3x49-6rqj

больше 7 лет назад

rack-protection gem timing attack vulnerability when validating CSRF token

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2019-00439

больше 7 лет назад

Уязвимость механизма защиты «rack-protection» фреймворка Sinatra для разработки веб-приложений на языке программирования Ruby, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2018-1086

больше 7 лет назад

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2018-1086

больше 7 лет назад

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2018-1086

больше 7 лет назад

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2018-1086

больше 7 лет назад

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug paramete ...

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2018-1079

больше 7 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
EPSS: Низкий
redhat логотип

CVE-2018-1079

больше 7 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
EPSS: Низкий
nvd логотип

CVE-2018-1079

больше 7 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
EPSS: Низкий
debian логотип

CVE-2018-1079

больше 7 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escal ...

CVSS3: 8.7
EPSS: Низкий
github логотип

GHSA-wxjj-jh24-cx5f

больше 3 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-p9pc-vgv7-x9j9

больше 3 лет назад

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2018-1060

ELSA-2018-1060: pcs security update (IMPORTANT)

больше 7 лет назад
ubuntu логотип
CVE-2018-1000119

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.

CVSS3: 5.9
0%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-1000119

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.

CVSS3: 3.7
0%
Низкий
больше 10 лет назад
nvd логотип
CVE-2018-1000119

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.

CVSS3: 5.9
0%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-1000119

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier conta ...

CVSS3: 5.9
0%
Низкий
больше 7 лет назад
github логотип
GHSA-688c-3x49-6rqj

rack-protection gem timing attack vulnerability when validating CSRF token

CVSS3: 5.9
0%
Низкий
больше 7 лет назад
fstec логотип
BDU:2019-00439

Уязвимость механизма защиты «rack-protection» фреймворка Sinatra для разработки веб-приложений на языке программирования Ruby, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
0%
Низкий
больше 7 лет назад
ubuntu логотип
CVE-2018-1086

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 4.3
0%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-1086

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 4.3
0%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-1086

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 4.3
0%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-1086

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug paramete ...

CVSS3: 4.3
0%
Низкий
больше 7 лет назад
ubuntu логотип
CVE-2018-1079

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
0%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-1079

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
0%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-1079

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
0%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-1079

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escal ...

CVSS3: 8.7
0%
Низкий
больше 7 лет назад
github логотип
GHSA-wxjj-jh24-cx5f

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-p9pc-vgv7-x9j9

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу