Логотип exploitDog
bind:CVE-2013-3500
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-3500

Количество 2

Количество 2

nvd логотип

CVE-2013-3500

почти 13 лет назад

The Foundation webapp admin interface in GroundWork Monitor Enterprise 6.7.0 uses the nagios account as the owner of writable files under /usr/local/groundwork, which allows context-dependent attackers to bypass intended filesystem restrictions by leveraging access to a GroundWork script.

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-rr46-c5p2-vrx2

больше 3 лет назад

The Foundation webapp admin interface in GroundWork Monitor Enterprise 6.7.0 uses the nagios account as the owner of writable files under /usr/local/groundwork, which allows context-dependent attackers to bypass intended filesystem restrictions by leveraging access to a GroundWork script.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2013-3500

The Foundation webapp admin interface in GroundWork Monitor Enterprise 6.7.0 uses the nagios account as the owner of writable files under /usr/local/groundwork, which allows context-dependent attackers to bypass intended filesystem restrictions by leveraging access to a GroundWork script.

CVSS2: 7.5
1%
Низкий
почти 13 лет назад
github логотип
GHSA-rr46-c5p2-vrx2

The Foundation webapp admin interface in GroundWork Monitor Enterprise 6.7.0 uses the nagios account as the owner of writable files under /usr/local/groundwork, which allows context-dependent attackers to bypass intended filesystem restrictions by leveraging access to a GroundWork script.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу