Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu cpio - vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2010-0624
Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar prior to 1.23 and GNU cpio prior to 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending mor...
Gnu Tar 1.13.16
Gnu Tar 1.13.17
Gnu Tar 1.14.90
Gnu Tar 1.15
Gnu Tar 1.18
Gnu Tar 1.17
Gnu Cpio 2.5
Gnu Cpio 2.5.90
Gnu Tar 1.13.11
Gnu Tar 1.13.14
Gnu Tar 1.14
Gnu Tar 1.14.1
Gnu Tar 1.20
Gnu Tar 1.19
Gnu Cpio 1.3
Gnu Cpio 2.4-2
Gnu Tar
Gnu Cpio
Gnu Tar 1.13.18
Gnu Tar 1.13.19
Gnu Tar 1.15.1
Gnu Tar 1.15.90
1 Github repository
7.5
CVSSv2
CVE-2007-4476
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
Gnu Tar
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 7.10
1 EDB exploit
3.7
CVSSv2
CVE-2005-4268
Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
Gnu Cpio 2.6-8
3.7
CVSSv2
CVE-2005-1111
Race condition in cpio 2.6 and previous versions allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by cpio after the decompression is complete.
Gnu Cpio
Debian Debian Linux 3.1
Debian Debian Linux 3.0
Canonical Ubuntu Linux 4.10
Canonical Ubuntu Linux 5.04
4.6
CVSSv2
CVE-2005-1229
Directory traversal vulnerability in cpio 2.6 and previous versions allows remote malicious users to write to arbitrary directories via a .. (dot dot) in a cpio file.
Gnu Cpio
2.1
CVSSv2
CVE-1999-1572
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
Mandrakesoft Mandrake Linux Cs3.0
Redhat Enterprise Linux 4.0
Debian Debian Linux 3.0
Freebsd Freebsd 2.1.0
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 10.1
Redhat Enterprise Linux Desktop 4.0
Ubuntu Ubuntu Linux 4.10
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Cs2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2