Логотип exploitDog
bind:CVE-2005-2807
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2005-2807

Количество 4

Количество 4

ubuntu логотип

CVE-2005-2807

около 20 лет назад

frox 0.7.18, when running setuid root, does not properly drop privileges when reading a configuration file, which allows local users to read portions of arbitrary files via the -f command line option.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2005-2807

около 20 лет назад

frox 0.7.18, when running setuid root, does not properly drop privileges when reading a configuration file, which allows local users to read portions of arbitrary files via the -f command line option.

CVSS2: 7.2
EPSS: Низкий
debian логотип

CVE-2005-2807

около 20 лет назад

frox 0.7.18, when running setuid root, does not properly drop privileg ...

CVSS2: 7.2
EPSS: Низкий
github логотип

GHSA-395p-wxvj-rq46

больше 3 лет назад

frox 0.7.18, when running setuid root, does not properly drop privileges when reading a configuration file, which allows local users to read portions of arbitrary files via the -f command line option.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2005-2807

frox 0.7.18, when running setuid root, does not properly drop privileges when reading a configuration file, which allows local users to read portions of arbitrary files via the -f command line option.

CVSS2: 7.2
0%
Низкий
около 20 лет назад
nvd логотип
CVE-2005-2807

frox 0.7.18, when running setuid root, does not properly drop privileges when reading a configuration file, which allows local users to read portions of arbitrary files via the -f command line option.

CVSS2: 7.2
0%
Низкий
около 20 лет назад
debian логотип
CVE-2005-2807

frox 0.7.18, when running setuid root, does not properly drop privileg ...

CVSS2: 7.2
0%
Низкий
около 20 лет назад
github логотип
GHSA-395p-wxvj-rq46

frox 0.7.18, when running setuid root, does not properly drop privileges when reading a configuration file, which allows local users to read portions of arbitrary files via the -f command line option.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу