Show filters
173 Total Results
Displaying 21-30 of 173
Sort by:
Attacker Value
Unknown
CVE-2012-2983
Disclosure Date: September 11, 2012 (last updated October 05, 2023)
file/edit_html.cgi in Webmin 1.590 and earlier does not perform an authorization check before showing a file's unedited contents, which allows remote attackers to read arbitrary files via the file field.
0
Attacker Value
Unknown
CVE-2011-1155
Disclosure Date: March 30, 2011 (last updated October 04, 2023)
The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
0
Attacker Value
Unknown
CVE-2011-1154
Disclosure Date: March 30, 2011 (last updated October 04, 2023)
The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
0
Attacker Value
Unknown
CVE-2011-1550
Disclosure Date: March 30, 2011 (last updated October 04, 2023)
The default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories for the (1) cobbler, (2) inn, (3) safte-monitor, and (4) uucp packages.
0
Attacker Value
Unknown
CVE-2011-1548
Disclosure Date: March 30, 2011 (last updated October 04, 2023)
The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by /var/log/postgresql/.
0
Attacker Value
Unknown
CVE-2011-1549
Disclosure Date: March 30, 2011 (last updated October 04, 2023)
The default configuration of logrotate on Gentoo Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories under /var/log/ for packages.
0
Attacker Value
Unknown
CVE-2011-1098
Disclosure Date: March 30, 2011 (last updated October 04, 2023)
Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.
0
Attacker Value
Unknown
CVE-2008-4579
Disclosure Date: October 15, 2008 (last updated October 04, 2023)
The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file.
0
Attacker Value
Unknown
CVE-2008-4580
Disclosure Date: October 15, 2008 (last updated October 04, 2023)
fence_manual, as used in fence 2.02.00-r1 and possibly cman, allows local users to modify arbitrary files via a symlink attack on the fence_manual.fifo temporary file.
0
Attacker Value
Unknown
CVE-2008-4394
Disclosure Date: October 10, 2008 (last updated October 04, 2023)
Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.
0