Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu coreutils 5.2.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-1039
Race condition in Core Utilities (coreutils) 5.2.1, when (1) mkdir, (2) mknod, or (3) mkfifo is running with the -m switch, allows local users to modify permissions of other files.
Gnu Coreutils 5.2.1
NA
CVE-2008-1946
The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module.
Gnu Coreutils 5.2.1
NA
CVE-2009-4135
The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 up to and including 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Gnu Coreutils 6.6
Gnu Coreutils 6.10
Gnu Coreutils 5.96
Gnu Coreutils 5.91
Gnu Coreutils 6.4
Gnu Coreutils 6.12
Gnu Coreutils 5.2.1
Gnu Coreutils 7.6
Gnu Coreutils 6.8
Gnu Coreutils 6.7
Gnu Coreutils 8.1
Gnu Coreutils 7.1
Gnu Coreutils 6.11
Gnu Coreutils 7.3
Gnu Coreutils 7.4
Gnu Coreutils 5.97
Gnu Coreutils 5.94
Gnu Coreutils 5.93
Gnu Coreutils 6.5
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started