Логотип exploitDog
bind:CVE-2003-0937
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2003-0937

Количество 2

Количество 2

nvd логотип

CVE-2003-0937

около 22 лет назад

SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user.

CVSS2: 4.6
EPSS: Низкий
github логотип

GHSA-hcmv-4364-jhrx

почти 4 года назад

SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2003-0937

SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user.

CVSS2: 4.6
0%
Низкий
около 22 лет назад
github логотип
GHSA-hcmv-4364-jhrx

SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user.

0%
Низкий
почти 4 года назад

Уязвимостей на страницу