Filtered by vendor Gnu
Subscribe
Total
989 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2012-1103 | 2 Gnu, Notmuchmail | 2 Emacs, Notmuch | 2012-09-25 | 4.3 MEDIUM | N/A |
emacs/notmuch-mua.el in Notmuch before 0.11.1, when using the Emacs interface, allows user-assisted remote attackers to read arbitrary files via crafted MML tags, which are not properly quoted in an email reply cna cause the files to be attached to the message. | |||||
CVE-2012-1175 | 1 Gnu | 1 Gnash | 2012-08-26 | 6.8 MEDIUM | N/A |
Integer overflow in the GnashImage::size method in libbase/GnashImage.h in GNU Gnash 0.8.10 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SWF file, which triggers a heap-based buffer overflow. | |||||
CVE-2010-4337 | 1 Gnu | 1 Gnash | 2012-06-18 | 3.3 LOW | N/A |
The configure script in gnash 0.8.8 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/gnash-configure-errors.$$, (2) /tmp/gnash-configure-warnings.$$, or (3) /tmp/gnash-configure-recommended.$$ files. | |||||
CVE-2009-5064 | 1 Gnu | 1 Glibc | 2012-01-18 | 6.9 MEDIUM | N/A |
** DISPUTED ** ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor states "This is just nonsense. There are a gazillion other ways to introduce code if people are downloading arbitrary binaries and install them in appropriate directories or set LD_LIBRARY_PATH etc." | |||||
CVE-2005-3355 | 1 Gnu | 1 Gnump3d | 2011-10-17 | 6.4 MEDIUM | N/A |
Directory traversal vulnerability in GNU Gnump3d before 2.9.8 has unknown impact via "CGI parameters, and cookie values". | |||||
CVE-2005-3349 | 1 Gnu | 1 Gnump3d | 2011-10-17 | 1.9 LOW | N/A |
GNU Gnump3d before 2.9.8 allows local users to modify or delete arbitrary files via a symlink attack on the index.lok temporary file. | |||||
CVE-2010-0002 | 1 Gnu | 1 Bash | 2011-08-07 | 2.1 LOW | N/A |
The /etc/profile.d/60alias.sh script in the Mandriva bash package for Bash 2.05b, 3.0, 3.2, 3.2.48, and 4.0 enables the --show-control-chars option in LS_OPTIONS, which allows local users to send escape sequences to terminal emulators, or hide the existence of a file, via a crafted filename. | |||||
CVE-2009-5082 | 2 Gnu, Openwall | 2 Groff, Owl | 2011-07-11 | 3.3 LOW | N/A |
The (1) configure and (2) config.guess scripts in GNU troff (aka groff) 1.20.1 on Openwall GNU/*/Linux (aka Owl) improperly create temporary files upon a failure of the mktemp function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file. | |||||
CVE-2007-6130 | 1 Gnu | 1 Gnump3d | 2011-03-07 | 5.0 MEDIUM | N/A |
gnump3d 2.9final does not apply password protection to its plugins, which might allow remote attackers to bypass intended access restrictions. | |||||
CVE-2007-5377 | 1 Gnu | 1 Tramp | 2011-03-07 | 6.9 MEDIUM | N/A |
The (1) tramp-make-temp-file and (2) tramp-make-tramp-temp-file functions in Tramp 2.1.10 extension for Emacs, and possibly earlier 2.1.x versions, allows local users to overwrite arbitrary files via a symlink attack on temporary files. | |||||
CVE-2006-4573 | 1 Gnu | 1 Screen | 2011-03-07 | 2.6 LOW | N/A |
Multiple unspecified vulnerabilities in the "utf8 combining characters handling" (utf8_handle_comb function in encoding.c) in screen before 4.0.3 allows user-assisted attackers to cause a denial of service (crash or hang) via certain UTF8 sequences. | |||||
CVE-2006-1712 | 1 Gnu | 1 Mailman | 2011-03-07 | 2.6 LOW | N/A |
Cross-site scripting (XSS) vulnerability in the private archive script (private.py) in GNU Mailman 2.1.7 allows remote attackers to inject arbitrary web script or HTML via the action argument. | |||||
CVE-2005-3424 | 1 Gnu | 1 Gnump3d | 2011-03-07 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in GNUMP3D before 2.9.5 allows remote attackers to inject arbitrary web script or HTML via 404 error pages, a different vulnerability than CVE-2005-3425. | |||||
CVE-2005-3123 | 1 Gnu | 1 Gnump3d | 2011-03-07 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in GNUMP3D before 2.9.6 allows remote attackers to read arbitrary files via crafted sequences such as "/.//..//////././", which is collapsed into "/.././" after ".." and "//" sequences are removed. | |||||
CVE-2003-1232 | 1 Gnu | 1 Emacs | 2011-03-07 | 5.1 MEDIUM | N/A |
Emacs 21.2.1 does not prompt or warn the user before executing Lisp code in the local variables section of a text file, which allows user-assisted attackers to execute arbitrary commands, as demonstrated using the mode-name variable. | |||||
CVE-2009-2624 | 1 Gnu | 1 Gzip | 2010-11-17 | 6.8 MEDIUM | N/A |
The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive. NOTE: this issue is caused by a CVE-2006-4334 regression. | |||||
CVE-2010-2056 | 1 Gnu | 1 Gv | 2010-07-21 | 3.3 LOW | N/A |
GNU gv before 3.7.0 allows local users to overwrite arbitrary files via a symlink attack on a temporary file. | |||||
CVE-2010-1160 | 1 Gnu | 1 Nano | 2010-06-06 | 1.9 LOW | N/A |
GNU nano before 2.2.4 does not verify whether a file has been changed before it is overwritten in a file-save operation, which allows local user-assisted attackers to overwrite arbitrary files via a symlink attack on an attacker-owned file that is being edited by the victim. | |||||
CVE-2010-1161 | 1 Gnu | 1 Nano | 2010-06-06 | 3.7 LOW | N/A |
Race condition in GNU nano before 2.2.4, when run by root to edit a file that is not owned by root, allows local user-assisted attackers to change the ownership of arbitrary files via vectors related to the creation of backup files. | |||||
CVE-2002-0388 | 1 Gnu | 1 Mailman | 2009-07-21 | 7.5 HIGH | N/A |
Cross-site scripting vulnerabilities in Mailman before 2.0.11 allow remote attackers to execute script via (1) the admin login page, or (2) the Pipermail index summaries. |