Логотип exploitDog
bind:CVE-2017-20148
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-20148

Количество 3

Количество 3

ubuntu логотип

CVE-2017-20148

больше 3 лет назад

In the ebuild package through logcheck-1.3.23.ebuild for Logcheck on Gentoo, it is possible to achieve root privilege escalation from the logcheck user because of insecure recursive chown calls.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2017-20148

больше 3 лет назад

In the ebuild package through logcheck-1.3.23.ebuild for Logcheck on Gentoo, it is possible to achieve root privilege escalation from the logcheck user because of insecure recursive chown calls.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-8qrg-f3r4-2pv6

больше 3 лет назад

In the ebuild package through logcheck-1.3.23.ebuild for Logcheck on Gentoo, it is possible to achieve root privilege escalation from the logcheck user because of insecure recursive chown calls.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-20148

In the ebuild package through logcheck-1.3.23.ebuild for Logcheck on Gentoo, it is possible to achieve root privilege escalation from the logcheck user because of insecure recursive chown calls.

CVSS3: 9.8
0%
Низкий
больше 3 лет назад
nvd логотип
CVE-2017-20148

In the ebuild package through logcheck-1.3.23.ebuild for Logcheck on Gentoo, it is possible to achieve root privilege escalation from the logcheck user because of insecure recursive chown calls.

CVSS3: 9.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-8qrg-f3r4-2pv6

In the ebuild package through logcheck-1.3.23.ebuild for Logcheck on Gentoo, it is possible to achieve root privilege escalation from the logcheck user because of insecure recursive chown calls.

CVSS3: 9.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу