Логотип exploitDog
bind:CVE-2015-3151
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-3151

Количество 4

Количество 4

redhat логотип

CVE-2015-3151

больше 10 лет назад

Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.

CVSS2: 6.6
EPSS: Низкий
nvd логотип

CVE-2015-3151

больше 5 лет назад

Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-9wj7-27x4-r2pw

больше 3 лет назад

Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2015-1083

около 10 лет назад

ELSA-2015-1083: abrt security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2015-3151

Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.

CVSS2: 6.6
0%
Низкий
больше 10 лет назад
nvd логотип
CVE-2015-3151

Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.

CVSS3: 7.8
0%
Низкий
больше 5 лет назад
github логотип
GHSA-9wj7-27x4-r2pw

Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2015-1083

ELSA-2015-1083: abrt security update (IMPORTANT)

около 10 лет назад

Уязвимостей на страницу