Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu coreutils 5.2.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-1039
Race condition in Core Utilities (coreutils) 5.2.1, when (1) mkdir, (2) mknod, or (3) mkfifo is running with the -m switch, allows local users to modify permissions of other files.
Gnu Coreutils 5.2.1
NA
CVE-2008-1946
The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module.
Gnu Coreutils 5.2.1
NA
CVE-2009-4135
The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 up to and including 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Gnu Coreutils 6.6
Gnu Coreutils 6.10
Gnu Coreutils 5.96
Gnu Coreutils 5.91
Gnu Coreutils 6.4
Gnu Coreutils 6.12
Gnu Coreutils 5.2.1
Gnu Coreutils 7.6
Gnu Coreutils 6.8
Gnu Coreutils 6.7
Gnu Coreutils 8.1
Gnu Coreutils 7.1
Gnu Coreutils 6.11
Gnu Coreutils 7.3
Gnu Coreutils 7.4
Gnu Coreutils 5.97
Gnu Coreutils 5.94
Gnu Coreutils 5.93
Gnu Coreutils 6.5
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started