Логотип exploitDog
bind:"CVE-2025-32803" OR bind:"CVE-2025-32801" OR bind:"CVE-2025-32802"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-32803" OR bind:"CVE-2025-32801" OR bind:"CVE-2025-32802"

Количество 16

Количество 16

oracle-oval логотип

ELSA-2025-9178

около 1 месяца назад

ELSA-2025-9178: kea security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2025-32803

2 месяца назад

In some cases, Kea log files or lease files may be world-readable. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 4
EPSS: Низкий
redhat логотип

CVE-2025-32803

2 месяца назад

In some cases, Kea log files or lease files may be world-readable. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 3.3
EPSS: Низкий
nvd логотип

CVE-2025-32803

2 месяца назад

In some cases, Kea log files or lease files may be world-readable. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 4
EPSS: Низкий
debian логотип

CVE-2025-32803

2 месяца назад

In some cases, Kea log files or lease files may be world-readable. Thi ...

CVSS3: 4
EPSS: Низкий
github логотип

GHSA-prj7-2jhj-62fj

2 месяца назад

In some cases, Kea log files or lease files may be world-readable. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 4
EPSS: Низкий
ubuntu логотип

CVE-2025-32802

2 месяца назад

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2025-32802

2 месяца назад

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2025-32802

2 месяца назад

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2025-32802

2 месяца назад

Kea configuration and API directives can be used to overwrite arbitrar ...

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2025-32801

2 месяца назад

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2025-32801

2 месяца назад

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2025-32801

2 месяца назад

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2025-32801

2 месяца назад

Kea configuration and API directives can be used to load a malicious h ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-vwc9-wh34-hrfm

2 месяца назад

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-hv8v-455m-2grc

2 месяца назад

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2025-9178

ELSA-2025-9178: kea security update (IMPORTANT)

около 1 месяца назад
ubuntu логотип
CVE-2025-32803

In some cases, Kea log files or lease files may be world-readable. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 4
0%
Низкий
2 месяца назад
redhat логотип
CVE-2025-32803

In some cases, Kea log files or lease files may be world-readable. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 3.3
0%
Низкий
2 месяца назад
nvd логотип
CVE-2025-32803

In some cases, Kea log files or lease files may be world-readable. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 4
0%
Низкий
2 месяца назад
debian логотип
CVE-2025-32803

In some cases, Kea log files or lease files may be world-readable. Thi ...

CVSS3: 4
0%
Низкий
2 месяца назад
github логотип
GHSA-prj7-2jhj-62fj

In some cases, Kea log files or lease files may be world-readable. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 4
0%
Низкий
2 месяца назад
ubuntu логотип
CVE-2025-32802

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 6.1
0%
Низкий
2 месяца назад
redhat логотип
CVE-2025-32802

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 6.1
0%
Низкий
2 месяца назад
nvd логотип
CVE-2025-32802

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 6.1
0%
Низкий
2 месяца назад
debian логотип
CVE-2025-32802

Kea configuration and API directives can be used to overwrite arbitrar ...

CVSS3: 6.1
0%
Низкий
2 месяца назад
ubuntu логотип
CVE-2025-32801

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 7.8
0%
Низкий
2 месяца назад
redhat логотип
CVE-2025-32801

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 7.8
0%
Низкий
2 месяца назад
nvd логотип
CVE-2025-32801

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 7.8
0%
Низкий
2 месяца назад
debian логотип
CVE-2025-32801

Kea configuration and API directives can be used to load a malicious h ...

CVSS3: 7.8
0%
Низкий
2 месяца назад
github логотип
GHSA-vwc9-wh34-hrfm

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 6.1
0%
Низкий
2 месяца назад
github логотип
GHSA-hv8v-455m-2grc

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 7.8
0%
Низкий
2 месяца назад

Уязвимостей на страницу