CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
sgml-tools (aka sgmltools) before 1.0.9-15 creates temporary files with insecure permissions, which allows other users to read files that are being processed by sgml-tools. | 2.1 |
|||
time server daemon timed allows remote attackers to cause a denial of service via malformed packets. | 10 |
|||
Format string vulnerability in Mutt before 1.2.5 allows a remote malicious IMAP server to execute arbitrary commands. | 7.5 |
|||
Buffer overflow in (1) wrapping and (2) unwrapping functions of slrn news reader before 0.9.7.0 allows remote attackers to execute arbitrary commands via a long message header. | 7.5 |
|||
gpm 1.19.3 allows local users to overwrite arbitrary files via a symlink attack. | 1.2 |
|||
sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack. | 1.2 |
|||
rdist 6.1.5 allows local users to overwrite arbitrary files via a symlink attack. | 1.2 |
|||
getty_ps 2.0.7j allows local users to overwrite arbitrary files via a symlink attack. | 1.2 |
|||
useradd program in shadow-utils program may allow local users to overwrite arbitrary files via a symlink attack. | 1.2 |
|||
exmh 2.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the exmhErrorMsg temporary file. | 1.2 |
|||
privatepw program in wu-ftpd before 2.6.1-6 allows local users to overwrite arbitrary files via a symlink attack. | 1.2 |
|||
inn 2.2.3 allows local users to overwrite arbitrary files via a symlink attack in some configurations. | 1.2 |
|||
arpwatch 2.1a4 allows local users to overwrite arbitrary files via a symlink attack in some configurations. | 1.2 |
|||
squid 2.3 and earlier allows local users to overwrite arbitrary files via a symlink attack in some configurations. | 1.2 |
|||
When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib. | 2.1 |
|||
kdesu program in KDE2 (KDE before 2.2.0-6) does not properly verify the owner of a UNIX socket that is used to send a password, which allows local users to steal passwords and gain privileges. | 2.1 |
|||
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages. | 7.2 |
|||
The default configuration of mod_perl for Apache as installed on Mandrake Linux 6.1 through 7.1 sets the /perl/ directory to be browseable, which allows remote attackers to list the contents of that directory. | 5 |
|||
Buffer overflow in ypserv in Mandrake Linux 7.1 and earlier, and possibly other Linux operating systems, allows an attacker to gain root privileges when ypserv is built without a vsyslog() function. | 10 |
|||
Format string vulnerability in ypserv in Mandrake Linux 7.1 and earlier, and possibly other Linux operating systems, allows an attacker to gain root privileges when ypserv is built without a vsyslog() function. | 10 |
|||
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack. | 7.2 |
|||
rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote attackers to cause a denial of service via a malformed request. | 5 |
|||
makewhatis in Linux man package allows local users to overwrite files via a symlink attack. | 7.2 |
|||
A race condition in MandrakeUpdate allows local users to modify RPM files while they are in the /tmp directory before they are installed. | 1.2 |
|||
Buffer overflow in kon program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via a long -StartupMessage parameter. | 7.2 |
|||
Buffer overflow in fld program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via an input file containing long CHARSET_REGISTRY or CHARSET_ENCODING settings. | 7.2 |
|||
Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack. | 2.1 |
|||
Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack. | 7.2 |
|||
Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument. | 7.2 |