|Max CVSS||7.5||Min CVSS||2.6||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script.
|16-10-2019 - 20:01||13-05-2005 - 04:00|
Format string vulnerability in the SetImageInfo function in image.c for ImageMagick 6.2.3 and other versions, and GraphicsMagick, allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a numeric fo
|19-10-2018 - 15:42||04-01-2006 - 23:03|
The delegate code in ImageMagick 184.108.40.206-0.3 allows remote attackers to execute arbitrary commands via shell metacharacters in a filename that is processed by the display command.
|19-10-2018 - 15:41||31-12-2005 - 05:00|
The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probabl
|19-10-2018 - 15:32||31-12-2005 - 05:00|
Race condition in bzip2 1.0.2 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by bzip2 after the decompression is complete.
|19-10-2018 - 15:31||02-05-2005 - 04:00|
bzip2 allows remote attackers to cause a denial of service (hard drive consumption) via a crafted bzip2 file that causes an infinite loop (a.k.a "decompression bomb").
|03-10-2018 - 21:30||19-05-2005 - 04:00|