Lucene search

K
LinuxfoundationOsquery

5 matches found

CVE
CVE
added 2020/03/13 12:15 a.m.85 views

CVE-2020-1887

Incorrect validation of the TLS SNI hostname in osquery versions after 2.9.0 and before 4.2.0 could allow an attacker to MITM osquery traffic in the absence of a configured root chain of trust.

9.1CVSS9.1AI score0.0011EPSS
CVE
CVE
added 2020/12/16 2:15 a.m.78 views

CVE-2020-26273

osquery is a SQL powered operating system instrumentation, monitoring, and analytics framework. In osquery before version 4.6.0, by using sqlite's ATTACH verb, someone with administrative access to osquery can cause reads and writes to arbitrary sqlite databases on disk. This does allow arbitrary f...

5.2CVSS5.4AI score0.0017EPSS
CVE
CVE
added 2019/06/03 7:29 p.m.74 views

CVE-2019-3567

In some configurations an attacker can inject a new executable path into the extensions.load file for osquery and hard link a parent folder of a malicious binary to a folder with known 'safe' permissions. Under those circumstances osquery will load said malicious executable with SYSTEM permissions....

9.3CVSS8AI score0.00433EPSS
CVE
CVE
added 2018/12/31 8:0 p.m.49 views

CVE-2018-6336

An issue was discovered in osquery. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code wi...

7.8CVSS7.5AI score0.00094EPSS
CVE
CVE
added 2020/07/10 7:15 p.m.44 views

CVE-2020-11081

osquery before version 4.4.0 enables a privilege escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...

8.2CVSS6.5AI score0.00052EPSS