Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
acpid vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-1159
acpid.c in acpid prior to 2.0.9 does not properly handle a situation in which a process has connected to acpid.socket but is not reading any data, which allows local users to cause a denial of service (daemon hang) via a crafted application that performs a connect system call but...
Tedfelix Acpid 2.0.3
Tedfelix Acpid 2.0.5
Tedfelix Acpid 2.06
Tedfelix Acpid 2.0.7
Tedfelix Acpid
Tedfelix Acpid 1.0.8
Tedfelix Acpid 1.0.10
Tedfelix Acpid 2.0.0
Tedfelix Acpid 2.0.1
Tedfelix Acpid 2.0.2
Tedfelix Acpid 2.0.4
1 EDB exploit
NA
CVE-2009-0798
ACPI Event Daemon (acpid) prior to 1.0.10 allows remote malicious users to cause a denial of service (CPU consumption and connectivity loss) by opening a large number of UNIX sockets without closing them, which triggers an infinite loop.
Tim Hockin Acpid 1.0.2
Tim Hockin Acpid 1.0.1
Tim Hockin Acpid
Tim Hockin Acpid 1.0.6
Tim Hockin Acpid 0.99.1
Tim Hockin Acpid 0.99.0
Tim Hockin Acpid 1.0.0
Tim Hockin Acpid 0.99.4
Tim Hockin Acpid 1.0.4
Tim Hockin Acpid 1.0.3
Tim Hockin Acpid 20010510
NA
CVE-2009-4033
A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by ...
Tim Hockin Acpid 1.0.4
NA
CVE-2009-4235
acpid 1.0.4 sets an unrestrictive umask, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file or cause a denial of service by overwriting this file, a different vulnerability than CVE-2009-4033.
Tim Hockin Acpid 1.0.4
NA
CVE-2011-4578
event.c in acpid (aka acpid2) prior to 2.0.11 does not have an appropriate umask setting during execution of event-handler scripts, which might allow local users to (1) perform write operations within directories created by a script, or (2) read files created by a script, via sta...
Tedfelix Acpid2
Tedfelix Acpid2 2.0.3
Tedfelix Acpid2 2.0.2
Tedfelix Acpid2 2.0.9
Tedfelix Acpid2 2.0.8
Tedfelix Acpid2 2.0.1
Tedfelix Acpid2 2.0.0
Tedfelix Acpid2 2.0.7
Tedfelix Acpid2 2.0.6
Tedfelix Acpid2 2.0.5
Tedfelix Acpid2 2.0.4
NA
CVE-2011-2777
samples/powerbtn/powerbtn.sh in acpid (aka acpid2) 2.0.16 and previous versions uses the pidof program incorrectly, which allows local users to gain privileges by running a program with the name kded4 and a DBUS_SESSION_BUS_ADDRESS environment variable containing commands.
Tedfelix Acpid2 2.0.14
Tedfelix Acpid2
Tedfelix Acpid2 2.0.8
Tedfelix Acpid2 2.0.2
Tedfelix Acpid2 2.0.13
Tedfelix Acpid2 2.0.15
Tedfelix Acpid2 2.0.0
Tedfelix Acpid2 2.0.9
Tedfelix Acpid2 2.0.3
Tedfelix Acpid2 2.0.1
Tedfelix Acpid2 2.0.10
Tedfelix Acpid2 2.0.7
Tedfelix Acpid2 2.0.6
Tedfelix Acpid2 2.0.11
Tedfelix Acpid2 2.0.12
Tedfelix Acpid2 2.0.5
Tedfelix Acpid2 2.0.4
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-3675
CVE-2024-3400
CVE-2024-23557
mass assignment
CVE-2023-1389
local file inclusion
CVE-2024-32596
file upload
CVE-2024-32593
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started