Логотип exploitDog
bind:CVE-2001-0366
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2001-0366

Количество 2

Количество 2

nvd логотип

CVE-2001-0366

около 24 лет назад

saposcol in SAP R/3 Web Application Server Demo before 1.5 trusts the PATH environmental variable to find and execute the expand program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse expand program.

CVSS2: 7.2
EPSS: Низкий
github логотип

GHSA-c74c-4fvx-4hwc

больше 3 лет назад

saposcol in SAP R/3 Web Application Server Demo before 1.5 trusts the PATH environmental variable to find and execute the expand program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse expand program.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2001-0366

saposcol in SAP R/3 Web Application Server Demo before 1.5 trusts the PATH environmental variable to find and execute the expand program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse expand program.

CVSS2: 7.2
0%
Низкий
около 24 лет назад
github логотип
GHSA-c74c-4fvx-4hwc

saposcol in SAP R/3 Web Application Server Demo before 1.5 trusts the PATH environmental variable to find and execute the expand program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse expand program.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу