Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
provos systrace 1.3 vulnerabilities and exploits
(subscribe to this query)
725
VMScore
CVE-2009-0343
Niels Provos Systrace 1.6f and previous versions on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in...
Niels Provos Systrace 1.6b
Niels Provos Systrace 1.6c
Niels Provos Systrace 1.1
Niels Provos Systrace 1.2
Niels Provos Systrace 1.6d
Niels Provos Systrace
Niels Provos Systrace 1.3
Niels Provos Systrace 1.4
Niels Provos Systrace 1.5
Niels Provos Systrace 1.6
Niels Provos Systrace 1.6a
1 EDB exploit
725
VMScore
CVE-2004-2012
The systrace_exit function in the systrace utility for NetBSD-current and 2.0 before April 16, 2004, and certain FreeBSD ports, does not verify the owner of the /dec/systrace connection before setting euid to 0, which allows local users to gain root privileges.
Niels Provos Systrace 1.2
Niels Provos Systrace 1.3
Niels Provos Systrace 1.1
Vladimir Kotal Systrace Port For Freebsd 2004-03-09
Vladimir Kotal Systrace Port For Freebsd 2004-06-02
Niels Provos Systrace 1.4
Niels Provos Systrace 1.5
Netbsd Netbsd 2.0
1 EDB exploit
641
VMScore
CVE-2009-0342
Niels Provos Systrace prior to 1.6f on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 64-bit syscall with a syscall number that corresponds to a policy-compliant 32-bit syscall.
Provos Systrace 1.5
Provos Systrace 1.6
Provos Systrace 1.3
Provos Systrace 1.4
Provos Systrace 1.1
Provos Systrace 1.2
Provos Systrace 1.6d
Provos Systrace
Provos Systrace 1.6a
Provos Systrace 1.6b
Provos Systrace 1.6c
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started