Логотип exploitDog
bind:CVE-2025-50691
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-50691

Количество 2

Количество 2

nvd логотип

CVE-2025-50691

6 месяцев назад

MCSManager 10.5.3 daemon process runs as a root account by default, and its sensitive data (including tokens and terminal content) is stored in the data directory, readable by all users. Other users on the system can read the daemon's key and use it to log in, leading to privilege escalation.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-wv45-cw2m-63r8

6 месяцев назад

MCSManager 10.5.3 daemon process runs as a root account by default, and its sensitive data (including tokens and terminal content) is stored in the data directory, readable by all users. Other users on the system can read the daemon's key and use it to log in, leading to privilege escalation.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-50691

MCSManager 10.5.3 daemon process runs as a root account by default, and its sensitive data (including tokens and terminal content) is stored in the data directory, readable by all users. Other users on the system can read the daemon's key and use it to log in, leading to privilege escalation.

CVSS3: 5.3
0%
Низкий
6 месяцев назад
github логотип
GHSA-wv45-cw2m-63r8

MCSManager 10.5.3 daemon process runs as a root account by default, and its sensitive data (including tokens and terminal content) is stored in the data directory, readable by all users. Other users on the system can read the daemon's key and use it to log in, leading to privilege escalation.

CVSS3: 5.3
0%
Низкий
6 месяцев назад

Уязвимостей на страницу