Логотип exploitDog
bind:CVE-2014-4999
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-4999

Количество 2

Количество 2

nvd логотип

CVE-2014-4999

около 8 лет назад

vendor/plugins/dataset/lib/dataset/database/mysql.rb in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-4ph7-5c44-pppv

больше 3 лет назад

kajam allows local users to obtain sensitive information by listing the process

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2014-4999

vendor/plugins/dataset/lib/dataset/database/mysql.rb in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process.

CVSS3: 7.8
0%
Низкий
около 8 лет назад
github логотип
GHSA-4ph7-5c44-pppv

kajam allows local users to obtain sensitive information by listing the process

CVSS3: 7.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу