Max CVSS | 6.9 | Min CVSS | 1.9 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2009-5064 | 6.9 |
ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor s
|
07-08-2024 - 08:16 | 30-03-2011 - 22:55 | |
CVE-2011-1098 | 1.9 |
Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.
|
13-02-2023 - 04:29 | 30-03-2011 - 22:55 | |
CVE-2011-1548 | 6.3 |
The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of sup
|
21-04-2011 - 02:33 | 30-03-2011 - 22:55 | |
CVE-2011-1549 | 6.3 |
The default configuration of logrotate on Gentoo Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support
|
21-04-2011 - 02:33 | 30-03-2011 - 22:55 | |
CVE-2011-1154 | 6.9 |
The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on
|
21-04-2011 - 02:33 | 30-03-2011 - 22:55 | |
CVE-2011-1155 | 1.9 |
The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a
|
21-04-2011 - 02:33 | 30-03-2011 - 22:55 | |
CVE-2011-1550 | 6.3 |
The default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack o
|
07-04-2011 - 04:00 | 30-03-2011 - 22:55 |