Логотип exploitDog
bind:CVE-2024-10963
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-10963

Количество 12

Количество 12

ubuntu логотип

CVE-2024-10963

около 1 года назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
EPSS: Низкий
redhat логотип

CVE-2024-10963

около 1 года назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2024-10963

около 1 года назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
EPSS: Низкий
msrc логотип

CVE-2024-10963

11 месяцев назад

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2024-10963

около 1 года назад

A flaw was found in pam_access, where certain rules in its configurati ...

CVSS3: 7.4
EPSS: Низкий
rocky логотип

RLSA-2024:10244

8 месяцев назад

Important: pam:1.5.1 security update

EPSS: Низкий
github логотип

GHSA-rw99-6hrh-fmjr

около 1 года назад

A vulnerability was found in pam_access due to the improper handling of tokens in access.conf, interpreted as hostnames. This flaw allows attackers to bypass access restrictions by spoofing hostnames, undermining configurations designed to limit access to specific TTYs or services. The flaw poses a risk in environments relying on these configurations for local access control.

CVSS3: 6.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-10244

12 месяцев назад

ELSA-2024-10244: pam:1.5.1 security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2025-02448

около 1 года назад

Уязвимость компонента pam_access файла access.conf модуля аутентификации Linux-PAM, позволяющая нарушителю обойти существующие ограничения безопасности и получить доступ к конфиденциальной информации

CVSS3: 7.4
EPSS: Низкий
rocky логотип

RLSA-2024:10379

11 месяцев назад

Important: pam security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-10379

12 месяцев назад

ELSA-2024-10379: pam security update (IMPORTANT)

EPSS: Низкий
redos логотип

ROS-20251006-07

около 1 месяца назад

Множественные уязвимости pam

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-10963

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-10963

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-10963

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
0%
Низкий
около 1 года назад
msrc логотип
CVSS3: 7.4
0%
Низкий
11 месяцев назад
debian логотип
CVE-2024-10963

A flaw was found in pam_access, where certain rules in its configurati ...

CVSS3: 7.4
0%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:10244

Important: pam:1.5.1 security update

0%
Низкий
8 месяцев назад
github логотип
GHSA-rw99-6hrh-fmjr

A vulnerability was found in pam_access due to the improper handling of tokens in access.conf, interpreted as hostnames. This flaw allows attackers to bypass access restrictions by spoofing hostnames, undermining configurations designed to limit access to specific TTYs or services. The flaw poses a risk in environments relying on these configurations for local access control.

CVSS3: 6.5
0%
Низкий
около 1 года назад
oracle-oval логотип
ELSA-2024-10244

ELSA-2024-10244: pam:1.5.1 security update (IMPORTANT)

12 месяцев назад
fstec логотип
BDU:2025-02448

Уязвимость компонента pam_access файла access.conf модуля аутентификации Linux-PAM, позволяющая нарушителю обойти существующие ограничения безопасности и получить доступ к конфиденциальной информации

CVSS3: 7.4
0%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:10379

Important: pam security update

11 месяцев назад
oracle-oval логотип
ELSA-2024-10379

ELSA-2024-10379: pam security update (IMPORTANT)

12 месяцев назад
redos логотип
ROS-20251006-07

Множественные уязвимости pam

CVSS3: 7.8
около 1 месяца назад

Уязвимостей на страницу