CVE-2023-6917
- EPSS 0.02%
- Veröffentlicht 28.02.2024 15:15:07
- Zuletzt bearbeitet 01.04.2025 15:34:51
A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group pri...
CVE-2012-5530
- EPSS 0.14%
- Veröffentlicht 29.11.2012 13:14:37
- Zuletzt bearbeitet 11.04.2025 00:51:21
The (1) pcmd and (2) pmlogger init scripts in Performance Co-Pilot (PCP) before 3.6.10 allow local users to overwrite arbitrary files via a symlink attack on a /var/tmp/##### temporary file.
- EPSS 6.05%
- Veröffentlicht 27.08.2012 23:55:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
libpcp in Performance Co-Pilot (PCP) before 3.6.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a PDU with the numcreds field value greater than the number of actual elements to the __pmDecodeCreds f...
- EPSS 1.4%
- Veröffentlicht 27.08.2012 23:55:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
Performance Co-Pilot (PCP) before 3.6.5 exports some of the /proc file system, which allows attackers to obtain sensitive information such as proc/pid/maps and command line arguments.
- EPSS 3.5%
- Veröffentlicht 27.08.2012 23:55:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
Multiple memory leaks in Performance Co-Pilot (PCP) before 3.6.5 allow remote attackers to cause a denial of service (memory consumption or daemon crash) via a large number of PDUs with (1) a crafted context number to the DoFetch function in pmcd/src...
- EPSS 2.46%
- Veröffentlicht 27.08.2012 23:55:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
The pduread function in pdu.c in libpcp in Performance Co-Pilot (PCP) before 3.6.5 does not properly time out connections, which allows remote attackers to cause a denial of service (pmcd hang) by sending individual bytes of a PDU separately, related...
CVE-2001-0823
- EPSS 0.24%
- Veröffentlicht 06.12.2001 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The pmpost program in Performance Co-Pilot (PCP) before 2.2.1-3 allows a local user to gain privileges via a symlink attack on the NOTICES file in the PCP log directory (PCP_LOG_DIR).