Логотип exploitDog
bind:CVE-2018-19046
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-19046

Количество 9

Количество 9

ubuntu логотип

CVE-2018-19046

больше 7 лет назад

keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially leaked sensitive information.

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2018-19046

больше 7 лет назад

keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially leaked sensitive information.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2018-19046

больше 7 лет назад

keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially leaked sensitive information.

CVSS3: 4.7
EPSS: Низкий
debian логотип

CVE-2018-19046

больше 7 лет назад

keepalived 2.0.8 didn't check for existing plain files when writing da ...

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-fjwx-29fr-83hw

больше 3 лет назад

keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially leaked sensitive information.

CVSS3: 4.7
EPSS: Низкий
fstec логотип

BDU:2020-05642

больше 7 лет назад

Уязвимость реализации вызовов PrintData или PrintStats системы балансировки сетевого трафика Keepalived, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 4.7
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:4213-1

около 7 лет назад

Security update for keepalived

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:4212-1

около 7 лет назад

Security update for keepalived

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0779-1

почти 6 лет назад

Security update for keepalived

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-19046

keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially leaked sensitive information.

CVSS3: 4.7
0%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-19046

keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially leaked sensitive information.

CVSS3: 7.1
0%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-19046

keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially leaked sensitive information.

CVSS3: 4.7
0%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-19046

keepalived 2.0.8 didn't check for existing plain files when writing da ...

CVSS3: 4.7
0%
Низкий
больше 7 лет назад
github логотип
GHSA-fjwx-29fr-83hw

keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially leaked sensitive information.

CVSS3: 4.7
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-05642

Уязвимость реализации вызовов PrintData или PrintStats системы балансировки сетевого трафика Keepalived, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 4.7
0%
Низкий
больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:4213-1

Security update for keepalived

около 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:4212-1

Security update for keepalived

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2020:0779-1

Security update for keepalived

почти 6 лет назад

Уязвимостей на страницу