Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu coreutils 5.2.1 vulnerabilities and exploits
(subscribe to this query)
3.7
CVSSv2
CVE-2005-1039
Race condition in Core Utilities (coreutils) 5.2.1, when (1) mkdir, (2) mknod, or (3) mkfifo is running with the -m switch, allows local users to modify permissions of other files.
Gnu Coreutils 5.2.1
4.4
CVSSv2
CVE-2008-1946
The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module.
Gnu Coreutils 5.2.1
4.4
CVSSv2
CVE-2009-4135
The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 up to and including 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Gnu Coreutils 6.6
Gnu Coreutils 6.10
Gnu Coreutils 5.96
Gnu Coreutils 5.91
Gnu Coreutils 6.4
Gnu Coreutils 6.12
Gnu Coreutils 5.2.1
Gnu Coreutils 7.6
Gnu Coreutils 6.8
Gnu Coreutils 6.7
Gnu Coreutils 8.1
Gnu Coreutils 7.1
Gnu Coreutils 6.11
Gnu Coreutils 7.3
Gnu Coreutils 7.4
Gnu Coreutils 5.97
Gnu Coreutils 5.94
Gnu Coreutils 5.93
Gnu Coreutils 6.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started