Количество 4
Количество 4
CVE-2011-2910
The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
CVE-2011-2910
The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
CVE-2011-2910
The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check ...
GHSA-mrq3-m48q-67j2
The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2011-2910 The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation. | CVSS3: 6.7 | 0% Низкий | около 6 лет назад | |
CVE-2011-2910 The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation. | CVSS3: 6.7 | 0% Низкий | около 6 лет назад | |
CVE-2011-2910 The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check ... | CVSS3: 6.7 | 0% Низкий | около 6 лет назад | |
GHSA-mrq3-m48q-67j2 The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation. | CVSS3: 6.7 | 0% Низкий | почти 4 года назад |
Уязвимостей на страницу