Логотип exploitDog
bind:"CVE-2020-28374"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-28374"

Количество 46

Количество 46

ubuntu логотип

CVE-2020-28374

почти 5 лет назад

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.

CVSS3: 8.1
EPSS: Низкий
redhat логотип

CVE-2020-28374

почти 5 лет назад

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2020-28374

почти 5 лет назад

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.

CVSS3: 8.1
EPSS: Низкий
msrc логотип

CVE-2020-28374

почти 5 лет назад

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7 insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request aka CID-2896c93811e3. For example an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2020-28374

почти 5 лет назад

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10. ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-xp87-7m9f-4cr9

больше 3 лет назад

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.

EPSS: Низкий
fstec логотип

BDU:2021-02587

почти 5 лет назад

Уязвимость драйверов drivers/target/target_core_xcopy.c ядра операционной системы Linux, позволяющая нарушителю получить доступ на чтение, изменение, добавление или удаление данных

CVSS3: 8.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0870-1

больше 4 лет назад

Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0842-1

больше 4 лет назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0841-1

больше 4 лет назад

Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9039

почти 5 лет назад

ELSA-2021-9039: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9035

почти 5 лет назад

ELSA-2021-9035: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9025

почти 5 лет назад

ELSA-2021-9025: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9024

почти 5 лет назад

ELSA-2021-9024: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9023

почти 5 лет назад

ELSA-2021-9023: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9008

почти 5 лет назад

ELSA-2021-9008: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9005

почти 5 лет назад

ELSA-2021-9005: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0868-1

больше 4 лет назад

Security update for the Linux Kernel (Live Patch 18 for SLE 15)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0849-1

больше 4 лет назад

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0826-1

больше 4 лет назад

Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP4)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-28374

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.

CVSS3: 8.1
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2020-28374

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.

CVSS3: 8.1
0%
Низкий
почти 5 лет назад
nvd логотип
CVE-2020-28374

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.

CVSS3: 8.1
0%
Низкий
почти 5 лет назад
msrc логотип
CVE-2020-28374

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7 insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request aka CID-2896c93811e3. For example an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.

CVSS3: 8.1
0%
Низкий
почти 5 лет назад
debian логотип
CVE-2020-28374

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10. ...

CVSS3: 8.1
0%
Низкий
почти 5 лет назад
github логотип
GHSA-xp87-7m9f-4cr9

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-02587

Уязвимость драйверов drivers/target/target_core_xcopy.c ядра операционной системы Linux, позволяющая нарушителю получить доступ на чтение, изменение, добавление или удаление данных

CVSS3: 8.1
0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0870-1

Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3)

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0842-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2)

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0841-1

Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2)

больше 4 лет назад
oracle-oval логотип
ELSA-2021-9039

ELSA-2021-9039: Unbreakable Enterprise kernel-container security update (IMPORTANT)

почти 5 лет назад
oracle-oval логотип
ELSA-2021-9035

ELSA-2021-9035: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 5 лет назад
oracle-oval логотип
ELSA-2021-9025

ELSA-2021-9025: Unbreakable Enterprise kernel-container security update (IMPORTANT)

почти 5 лет назад
oracle-oval логотип
ELSA-2021-9024

ELSA-2021-9024: Unbreakable Enterprise kernel-container security update (IMPORTANT)

почти 5 лет назад
oracle-oval логотип
ELSA-2021-9023

ELSA-2021-9023: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 5 лет назад
oracle-oval логотип
ELSA-2021-9008

ELSA-2021-9008: Unbreakable Enterprise kernel-container security update (IMPORTANT)

почти 5 лет назад
oracle-oval логотип
ELSA-2021-9005

ELSA-2021-9005: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0868-1

Security update for the Linux Kernel (Live Patch 18 for SLE 15)

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0849-1

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2)

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0826-1

Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP4)

больше 4 лет назад

Уязвимостей на страницу