Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
rpath rpath linux vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2013-7172
Slackware 13.1, 13.37, 14.0 and 14.1 contain world-writable permissions on the iodbctest and iodbctestw programs within the libiodbc package, which could allow local users to use RPATH information to execute arbitrary code with root privileges.
Slackware Slackware Linux 13.1
Slackware Slackware Linux 13.37
Slackware Slackware Linux 14.0
Slackware Slackware Linux 14.1
NA
CVE-2006-0646
ld in SUSE Linux 9.1 up to and including 10.0, and SLES 9, in certain circumstances when linking binaries, can leave an empty RPATH or RUNPATH, which allows local malicious users to execute arbitrary code as other users via by running an ld-linked application from the current dir...
Suse Suse Linux 10.0
Suse Suse Linux 9.2
Suse Suse Linux 9.3
Suse Suse Linux 9.0
Suse Suse Linux 9.1
NA
CVE-2006-1565
Untrusted search path vulnerability in libgpib-perl 3.2.06-2 in Debian GNU/Linux includes an RPATH value under the /tmp/buildd directory for the LinuxGpib.so module, which might allow local users to gain privileges by installing malicious libraries in that directory.
Debian Debian Linux 3.1
NA
CVE-2006-1566
Untrusted search path vulnerability in libtunepimp-perl 0.4.2-1 in Debian GNU/Linux includes an RPATH value under the /tmp/buildd directory for the tunepimp.so module, which might allow local users to gain privileges by installing malicious libraries in that directory.
Debian Debian Linux 3.1
NA
CVE-2006-1564
Untrusted search path vulnerability in libapache2-svn 1.3.0-4 for Subversion in Debian GNU/Linux includes RPATH values under the /tmp/svn directory for the (1) mod_authz_svn.so and (2) mod_dav_svn.so modules, which might allow local users to gain privileges by installing maliciou...
Debian Debian Linux 3.1
NA
CVE-2008-1951
Untrusted search path vulnerability in a certain Red Hat build script for Standards Based Linux Instrumentation for Manageability (sblim) libraries prior to 1-13a.el4_6.1 in Red Hat Enterprise Linux (RHEL) 4, and prior to 1-31.el5_2.1 in RHEL 5, allows local users to gain privile...
Redhat Enterprise Linux 4
Redhat Enterprise Linux 5
9.8
CVSSv3
CVE-2018-11236
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and previous versions, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentiall...
Gnu Glibc
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Virtualization Host 4.0
Oracle Enterprise Communications Broker 3.0.0
Oracle Enterprise Communications Broker 3.1.0
Oracle Communications Session Border Controller 8.1.0
Oracle Communications Session Border Controller 8.2.0
Oracle Communications Session Border Controller 8.0.0
Netapp Data Ontap Edge -
Netapp Element Software Management -
NA
CVE-2005-4728
Untrusted search path vulnerability (RPATH) in amaya 9.2.1 on Debian GNU/Linux allows local users to gain privileges via a malicious Mesa library in the /home/anand directory.
Debian Amaya 9.2.1.6
NA
CVE-2005-4595
Untrusted search path vulnerability (RPATH) in XnView 1.70 and NView 4.51 on Gentoo Linux allows local users to execute arbitrary code via a malicious library in the current working directory.
Gentoo Nview 4.51
Gentoo Xnview 1.70
NA
CVE-2008-4815
Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.2 and previous versions on Unix and Linux allows malicious users to gain privileges via a Trojan Horse program in an unspecified directory that is associated with an insecure RPATH.
Adobe Acrobat
Adobe Acrobat 8.1.1
Adobe Acrobat Reader
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »