Логотип exploitDog
bind:CVE-2004-0157
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2004-0157

Количество 4

Количество 4

ubuntu логотип

CVE-2004-0157

около 21 года назад

x11.c in xonix 1.4 and earlier uses the current working directory to find and execute the rmail program, which allows local users to execute arbitrary code by modifying the path to point to a malicious rmail program.

CVSS2: 4.6
EPSS: Низкий
nvd логотип

CVE-2004-0157

около 21 года назад

x11.c in xonix 1.4 and earlier uses the current working directory to find and execute the rmail program, which allows local users to execute arbitrary code by modifying the path to point to a malicious rmail program.

CVSS2: 4.6
EPSS: Низкий
debian логотип

CVE-2004-0157

около 21 года назад

x11.c in xonix 1.4 and earlier uses the current working directory to f ...

CVSS2: 4.6
EPSS: Низкий
github логотип

GHSA-c98c-vg9g-2g99

около 3 лет назад

x11.c in xonix 1.4 and earlier uses the current working directory to find and execute the rmail program, which allows local users to execute arbitrary code by modifying the path to point to a malicious rmail program.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2004-0157

x11.c in xonix 1.4 and earlier uses the current working directory to find and execute the rmail program, which allows local users to execute arbitrary code by modifying the path to point to a malicious rmail program.

CVSS2: 4.6
0%
Низкий
около 21 года назад
nvd логотип
CVE-2004-0157

x11.c in xonix 1.4 and earlier uses the current working directory to find and execute the rmail program, which allows local users to execute arbitrary code by modifying the path to point to a malicious rmail program.

CVSS2: 4.6
0%
Низкий
около 21 года назад
debian логотип
CVE-2004-0157

x11.c in xonix 1.4 and earlier uses the current working directory to f ...

CVSS2: 4.6
0%
Низкий
около 21 года назад
github логотип
GHSA-c98c-vg9g-2g99

x11.c in xonix 1.4 and earlier uses the current working directory to find and execute the rmail program, which allows local users to execute arbitrary code by modifying the path to point to a malicious rmail program.

0%
Низкий
около 3 лет назад

Уязвимостей на страницу