Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m3qf-v679-cpx6

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Xsession script, as used by X Display Manager (xdm) in NetBSD before 20060212, X.Org before 20060317, and Solaris 8 through 10 before 20061006, allows local users to overwrite arbitrary files, or read another user's Xsession errors file, via a symlink attack on a /tmp/xses-$USER file.

The Xsession script, as used by X Display Manager (xdm) in NetBSD before 20060212, X.Org before 20060317, and Solaris 8 through 10 before 20061006, allows local users to overwrite arbitrary files, or read another user's Xsession errors file, via a symlink attack on a /tmp/xses-$USER file.

EPSS

Процентиль: 24%
0.00079
Низкий

Связанные уязвимости

redhat
больше 19 лет назад

The Xsession script, as used by X Display Manager (xdm) in NetBSD before 20060212, X.Org before 20060317, and Solaris 8 through 10 before 20061006, allows local users to overwrite arbitrary files, or read another user's Xsession errors file, via a symlink attack on a /tmp/xses-$USER file.

nvd
почти 19 лет назад

The Xsession script, as used by X Display Manager (xdm) in NetBSD before 20060212, X.Org before 20060317, and Solaris 8 through 10 before 20061006, allows local users to overwrite arbitrary files, or read another user's Xsession errors file, via a symlink attack on a /tmp/xses-$USER file.

debian
почти 19 лет назад

The Xsession script, as used by X Display Manager (xdm) in NetBSD befo ...

EPSS

Процентиль: 24%
0.00079
Низкий