Логотип exploitDog
bind:"CVE-2010-3853" OR bind:"CVE-2010-4707" OR bind:"CVE-2010-3316" OR bind:"CVE-2010-3435"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2010-3853" OR bind:"CVE-2010-4707" OR bind:"CVE-2010-3316" OR bind:"CVE-2010-3435"

Количество 32

Количество 32

oracle-oval логотип

ELSA-2010-0819

больше 14 лет назад

ELSA-2010-0819: pam security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2010-0891

больше 14 лет назад

ELSA-2010-0891: pam security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2015-06025

больше 14 лет назад

Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.2
EPSS: Низкий
fstec логотип

BDU:2015-06023

больше 14 лет назад

Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.2
EPSS: Низкий
fstec логотип

BDU:2015-06022

больше 14 лет назад

Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.2
EPSS: Низкий
ubuntu логотип

CVE-2010-3853

больше 14 лет назад

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.

CVSS2: 6.9
EPSS: Низкий
redhat логотип

CVE-2010-3853

больше 14 лет назад

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.

CVSS2: 6.2
EPSS: Низкий
nvd логотип

CVE-2010-3853

больше 14 лет назад

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.

CVSS2: 6.9
EPSS: Низкий
debian логотип

CVE-2010-3853

больше 14 лет назад

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) bef ...

CVSS2: 6.9
EPSS: Низкий
github логотип

GHSA-94f7-h6jj-cq78

около 3 лет назад

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.

EPSS: Низкий
ubuntu логотип

CVE-2010-4707

больше 14 лет назад

The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.

CVSS2: 4.9
EPSS: Низкий
redhat логотип

CVE-2010-4707

больше 14 лет назад

The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.

CVSS2: 2.1
EPSS: Низкий
nvd логотип

CVE-2010-4707

больше 14 лет назад

The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.

CVSS2: 4.9
EPSS: Низкий
debian логотип

CVE-2010-4707

больше 14 лет назад

The check_acl function in pam_xauth.c in the pam_xauth module in Linux ...

CVSS2: 4.9
EPSS: Низкий
github логотип

GHSA-frff-99c9-q6rc

около 3 лет назад

The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.

EPSS: Низкий
ubuntu логотип

CVE-2010-3435

больше 14 лет назад

The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.

CVSS2: 4.7
EPSS: Низкий
redhat логотип

CVE-2010-3435

почти 15 лет назад

The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.

CVSS2: 1.2
EPSS: Низкий
nvd логотип

CVE-2010-3435

больше 14 лет назад

The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.

CVSS2: 4.7
EPSS: Низкий
debian логотип

CVE-2010-3435

больше 14 лет назад

The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before ...

CVSS2: 4.7
EPSS: Низкий
ubuntu логотип

CVE-2010-3316

больше 14 лет назад

The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.

CVSS2: 3.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2010-0819

ELSA-2010-0819: pam security update (MODERATE)

больше 14 лет назад
oracle-oval логотип
ELSA-2010-0891

ELSA-2010-0891: pam security update (MODERATE)

больше 14 лет назад
fstec логотип
BDU:2015-06025

Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.2
больше 14 лет назад
fstec логотип
BDU:2015-06023

Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.2
больше 14 лет назад
fstec логотип
BDU:2015-06022

Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.2
больше 14 лет назад
ubuntu логотип
CVE-2010-3853

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.

CVSS2: 6.9
0%
Низкий
больше 14 лет назад
redhat логотип
CVE-2010-3853

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.

CVSS2: 6.2
0%
Низкий
больше 14 лет назад
nvd логотип
CVE-2010-3853

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.

CVSS2: 6.9
0%
Низкий
больше 14 лет назад
debian логотип
CVE-2010-3853

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) bef ...

CVSS2: 6.9
0%
Низкий
больше 14 лет назад
github логотип
GHSA-94f7-h6jj-cq78

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.

0%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2010-4707

The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.

CVSS2: 4.9
0%
Низкий
больше 14 лет назад
redhat логотип
CVE-2010-4707

The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.

CVSS2: 2.1
0%
Низкий
больше 14 лет назад
nvd логотип
CVE-2010-4707

The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.

CVSS2: 4.9
0%
Низкий
больше 14 лет назад
debian логотип
CVE-2010-4707

The check_acl function in pam_xauth.c in the pam_xauth module in Linux ...

CVSS2: 4.9
0%
Низкий
больше 14 лет назад
github логотип
GHSA-frff-99c9-q6rc

The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.

0%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2010-3435

The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.

CVSS2: 4.7
0%
Низкий
больше 14 лет назад
redhat логотип
CVE-2010-3435

The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.

CVSS2: 1.2
0%
Низкий
почти 15 лет назад
nvd логотип
CVE-2010-3435

The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.

CVSS2: 4.7
0%
Низкий
больше 14 лет назад
debian логотип
CVE-2010-3435

The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before ...

CVSS2: 4.7
0%
Низкий
больше 14 лет назад
ubuntu логотип
CVE-2010-3316

The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.

CVSS2: 3.3
0%
Низкий
больше 14 лет назад

Уязвимостей на страницу