CVE-2020-26273
- EPSS 0.11%
- Veröffentlicht 16.12.2020 02:15:13
- Zuletzt bearbeitet 21.11.2024 05:19:43
osquery is a SQL powered operating system instrumentation, monitoring, and analytics framework. In osquery before version 4.6.0, by using sqlite's ATTACH verb, someone with administrative access to osquery can cause reads and writes to arbitrary sqli...
CVE-2020-11081
- EPSS 0.05%
- Veröffentlicht 10.07.2020 19:15:11
- Zuletzt bearbeitet 21.11.2024 04:56:44
osquery before version 4.4.0 enables a privilege escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osq...
CVE-2020-1887
- EPSS 0.11%
- Veröffentlicht 13.03.2020 00:15:11
- Zuletzt bearbeitet 21.11.2024 05:11:32
Incorrect validation of the TLS SNI hostname in osquery versions after 2.9.0 and before 4.2.0 could allow an attacker to MITM osquery traffic in the absence of a configured root chain of trust.
CVE-2019-3567
- EPSS 0.43%
- Veröffentlicht 03.06.2019 19:29:01
- Zuletzt bearbeitet 21.11.2024 04:42:10
In some configurations an attacker can inject a new executable path into the extensions.load file for osquery and hard link a parent folder of a malicious binary to a folder with known 'safe' permissions. Under those circumstances osquery will load s...
CVE-2018-6336
- EPSS 0.09%
- Veröffentlicht 31.12.2018 19:29:00
- Zuletzt bearbeitet 06.05.2025 19:15:53
An issue was discovered in osquery. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is si...