Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu coreutils 5.2.1 vulnerabilities and exploits
(subscribe to this query)
392
VMScore
CVE-2008-1946
The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module.
Gnu Coreutils 5.2.1
329
VMScore
CVE-2005-1039
Race condition in Core Utilities (coreutils) 5.2.1, when (1) mkdir, (2) mknod, or (3) mkfifo is running with the -m switch, allows local users to modify permissions of other files.
Gnu Coreutils 5.2.1
392
VMScore
CVE-2009-4135
The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 up to and including 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Gnu Coreutils 6.6
Gnu Coreutils 6.10
Gnu Coreutils 5.96
Gnu Coreutils 5.91
Gnu Coreutils 6.4
Gnu Coreutils 6.12
Gnu Coreutils 5.2.1
Gnu Coreutils 7.6
Gnu Coreutils 6.8
Gnu Coreutils 6.7
Gnu Coreutils 8.1
Gnu Coreutils 7.1
Gnu Coreutils 6.11
Gnu Coreutils 7.3
Gnu Coreutils 7.4
Gnu Coreutils 5.97
Gnu Coreutils 5.94
Gnu Coreutils 5.93
Gnu Coreutils 6.5
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started