Логотип exploitDog
bind:CVE-2025-12744
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-12744

Количество 3

Количество 3

nvd логотип

CVE-2025-12744

2 месяца назад

A flaw was found in the ABRT daemon’s handling of user-supplied mount information.ABRT copies up to 12 characters from an untrusted input and places them directly into a shell command (docker inspect %s) without proper validation. An unprivileged local user can craft a payload that injects shell metacharacters, causing the root-running ABRT process to execute attacker-controlled commands and ultimately gain full root privileges.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-vwhf-x6j3-3qfg

2 месяца назад

A flaw was found in the ABRT daemon’s handling of user-supplied mount information.ABRT copies up to 12 characters from an untrusted input and places them directly into a shell command (docker inspect %s) without proper validation. An unprivileged local user can craft a payload that injects shell metacharacters, causing the root-running ABRT process to execute attacker-controlled commands and ultimately gain full root privileges.

CVSS3: 8.8
EPSS: Низкий
oracle-oval логотип

ELSA-2025-22760

2 месяца назад

ELSA-2025-22760: abrt security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-12744

A flaw was found in the ABRT daemon’s handling of user-supplied mount information.ABRT copies up to 12 characters from an untrusted input and places them directly into a shell command (docker inspect %s) without proper validation. An unprivileged local user can craft a payload that injects shell metacharacters, causing the root-running ABRT process to execute attacker-controlled commands and ultimately gain full root privileges.

CVSS3: 8.8
0%
Низкий
2 месяца назад
github логотип
GHSA-vwhf-x6j3-3qfg

A flaw was found in the ABRT daemon’s handling of user-supplied mount information.ABRT copies up to 12 characters from an untrusted input and places them directly into a shell command (docker inspect %s) without proper validation. An unprivileged local user can craft a payload that injects shell metacharacters, causing the root-running ABRT process to execute attacker-controlled commands and ultimately gain full root privileges.

CVSS3: 8.8
0%
Низкий
2 месяца назад
oracle-oval логотип
ELSA-2025-22760

ELSA-2025-22760: abrt security update (IMPORTANT)

2 месяца назад

Уязвимостей на страницу