5
CVE-2012-3419
- EPSS 1.4%
- Published 27.08.2012 23:55:02
- Last modified 11.04.2025 00:51:21
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
Performance Co-Pilot (PCP) before 3.6.5 exports some of the /proc file system, which allows attackers to obtain sensitive information such as proc/pid/maps and command line arguments.
Data is provided by the National Vulnerability Database (NVD)
Sgi ≫ Performance Co-pilot Version <= 3.6.4
Sgi ≫ Performance Co-pilot Version2.1.1
Sgi ≫ Performance Co-pilot Version2.1.2
Sgi ≫ Performance Co-pilot Version2.1.3
Sgi ≫ Performance Co-pilot Version2.1.4
Sgi ≫ Performance Co-pilot Version2.1.5
Sgi ≫ Performance Co-pilot Version2.1.6
Sgi ≫ Performance Co-pilot Version2.1.7
Sgi ≫ Performance Co-pilot Version2.1.8
Sgi ≫ Performance Co-pilot Version2.1.9
Sgi ≫ Performance Co-pilot Version2.1.10
Sgi ≫ Performance Co-pilot Version2.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.4% | 0.786 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.