Количество 7
Количество 7
CVE-2020-10699
A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.
CVE-2020-10699
A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.
CVE-2020-10699
A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.
CVE-2020-10699
A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 ...
GHSA-pvmm-475g-fx2h
A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.
ELSA-2020-1933
ELSA-2020-1933: targetcli security update (IMPORTANT)
BDU:2020-02418
Уязвимость компонента /var/run/targetclid.sock демона targetclid операционных систем Linux, позволяющая нарушителю повысить свои привилегии
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-10699 A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root. | CVSS3: 7.8 | 0% Низкий | почти 6 лет назад | |
CVE-2020-10699 A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root. | CVSS3: 7.8 | 0% Низкий | почти 6 лет назад | |
CVE-2020-10699 A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root. | CVSS3: 7.8 | 0% Низкий | почти 6 лет назад | |
CVE-2020-10699 A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 ... | CVSS3: 7.8 | 0% Низкий | почти 6 лет назад | |
GHSA-pvmm-475g-fx2h A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
ELSA-2020-1933 ELSA-2020-1933: targetcli security update (IMPORTANT) | почти 6 лет назад | |||
BDU:2020-02418 Уязвимость компонента /var/run/targetclid.sock демона targetclid операционных систем Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 0% Низкий | почти 6 лет назад |
Уязвимостей на страницу