Логотип exploitDog
bind:CVE-2026-28372
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-28372

Количество 5

Количество 5

ubuntu логотип

CVE-2026-28372

около 1 месяца назад

telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2026-28372

около 1 месяца назад

telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2026-28372

около 1 месяца назад

telnetd in GNU inetutils through 2.7 allows privilege escalation that ...

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-j682-47rx-fxrp

около 1 месяца назад

telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.

CVSS3: 7.4
EPSS: Низкий
fstec логотип

BDU:2026-02403

около 1 месяца назад

Уязвимость сервера telnetd пакета сетевых программ inetutils, позволяющая нарушителю повысить свои привилегии до уровня root

CVSS3: 7.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-28372

telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.

CVSS3: 7.4
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2026-28372

telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.

CVSS3: 7.4
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2026-28372

telnetd in GNU inetutils through 2.7 allows privilege escalation that ...

CVSS3: 7.4
0%
Низкий
около 1 месяца назад
github логотип
GHSA-j682-47rx-fxrp

telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.

CVSS3: 7.4
0%
Низкий
около 1 месяца назад
fstec логотип
BDU:2026-02403

Уязвимость сервера telnetd пакета сетевых программ inetutils, позволяющая нарушителю повысить свои привилегии до уровня root

CVSS3: 7.4
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу