Логотип exploitDog
bind:CVE-2014-3632
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-3632

Количество 5

Количество 5

ubuntu логотип

CVE-2014-3632

больше 11 лет назад

The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.

CVSS2: 7.6
EPSS: Низкий
redhat логотип

CVE-2014-3632

больше 11 лет назад

The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.

CVSS2: 6.2
EPSS: Низкий
nvd логотип

CVE-2014-3632

больше 11 лет назад

The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.

CVSS2: 7.6
EPSS: Низкий
debian логотип

CVE-2014-3632

больше 11 лет назад

The default configuration in a sudoers file in the Red Hat openstack-n ...

CVSS2: 7.6
EPSS: Низкий
github логотип

GHSA-hr9q-fc36-qcfj

больше 3 лет назад

The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2014-3632

The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.

CVSS2: 7.6
1%
Низкий
больше 11 лет назад
redhat логотип
CVE-2014-3632

The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.

CVSS2: 6.2
1%
Низкий
больше 11 лет назад
nvd логотип
CVE-2014-3632

The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.

CVSS2: 7.6
1%
Низкий
больше 11 лет назад
debian логотип
CVE-2014-3632

The default configuration in a sudoers file in the Red Hat openstack-n ...

CVSS2: 7.6
1%
Низкий
больше 11 лет назад
github логотип
GHSA-hr9q-fc36-qcfj

The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу