Количество 5
Количество 5
CVE-2020-6105
An exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause Information overwrite resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2020-6105
An exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause Information overwrite resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2020-6105
An exploitable code execution vulnerability exists in the multiple dev ...
GHSA-4883-9gwj-77mj
An exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause Information overwrite resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.
BDU:2021-06199
Уязвимость утилиты F2fs-Tools, связанная с некорректным внешним управлением именем или путем файла, позволяющая нарушителю удалять произвольные файлы
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-6105 An exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause Information overwrite resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability. | CVSS3: 7.8 | 1% Низкий | больше 5 лет назад | |
CVE-2020-6105 An exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause Information overwrite resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability. | CVSS3: 7.8 | 1% Низкий | больше 5 лет назад | |
CVE-2020-6105 An exploitable code execution vulnerability exists in the multiple dev ... | CVSS3: 7.8 | 1% Низкий | больше 5 лет назад | |
GHSA-4883-9gwj-77mj An exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause Information overwrite resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability. | CVSS3: 7.8 | 1% Низкий | больше 3 лет назад | |
BDU:2021-06199 Уязвимость утилиты F2fs-Tools, связанная с некорректным внешним управлением именем или путем файла, позволяющая нарушителю удалять произвольные файлы | CVSS3: 6 | 1% Низкий | больше 5 лет назад |
Уязвимостей на страницу