Количество 17
Количество 17
GHSA-g527-g4q2-57xc
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2021-3621
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2021-3621
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2021-3621
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2021-3621
A flaw was found in SSSD, where the sssctl command was vulnerable to s ...
openSUSE-SU-2021:2941-1
Security update for sssd
SUSE-SU-2022:2763-1
Security update for sssd
SUSE-SU-2022:1258-1
Security update for sssd
SUSE-SU-2022:0826-1
Security update for sssd
SUSE-SU-2021:2941-1
Security update for sssd
SUSE-SU-2021:2873-1
Security update for sssd
SUSE-RU-2021:3185-1
Recommended update for sssd
RLSA-2021:3151
Important: sssd security update
ELSA-2021-3336
ELSA-2021-3336: sssd security and bug fix update (IMPORTANT)
ELSA-2021-3151
ELSA-2021-3151: sssd security update (IMPORTANT)
BDU:2023-07637
Уязвимость команды sssctl сервиса управления доступом к удаленным каталогам и механизма аутентификации SSSD, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
ROS-20240916-11
Уязвимость sssd
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-g527-g4q2-57xc A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | CVSS3: 8.8 | 0% Низкий | почти 4 года назад | |
CVE-2021-3621 A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | CVSS3: 8.8 | 0% Низкий | почти 4 года назад | |
CVE-2021-3621 A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | CVSS3: 6.7 | 0% Низкий | больше 4 лет назад | |
CVE-2021-3621 A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | CVSS3: 8.8 | 0% Низкий | почти 4 года назад | |
CVE-2021-3621 A flaw was found in SSSD, where the sssctl command was vulnerable to s ... | CVSS3: 8.8 | 0% Низкий | почти 4 года назад | |
openSUSE-SU-2021:2941-1 Security update for sssd | 0% Низкий | больше 4 лет назад | ||
SUSE-SU-2022:2763-1 Security update for sssd | 0% Низкий | больше 3 лет назад | ||
SUSE-SU-2022:1258-1 Security update for sssd | 0% Низкий | больше 3 лет назад | ||
SUSE-SU-2022:0826-1 Security update for sssd | 0% Низкий | почти 4 года назад | ||
SUSE-SU-2021:2941-1 Security update for sssd | 0% Низкий | больше 4 лет назад | ||
SUSE-SU-2021:2873-1 Security update for sssd | 0% Низкий | больше 4 лет назад | ||
SUSE-RU-2021:3185-1 Recommended update for sssd | 0% Низкий | около 4 лет назад | ||
RLSA-2021:3151 Important: sssd security update | 0% Низкий | больше 4 лет назад | ||
ELSA-2021-3336 ELSA-2021-3336: sssd security and bug fix update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-3151 ELSA-2021-3151: sssd security update (IMPORTANT) | больше 4 лет назад | |||
BDU:2023-07637 Уязвимость команды sssctl сервиса управления доступом к удаленным каталогам и механизма аутентификации SSSD, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 8.8 | 0% Низкий | больше 4 лет назад | |
ROS-20240916-11 Уязвимость sssd | CVSS3: 8.8 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу