Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
acpid vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2011-1159
acpid.c in acpid prior to 2.0.9 does not properly handle a situation in which a process has connected to acpid.socket but is not reading any data, which allows local users to cause a denial of service (daemon hang) via a crafted application that performs a connect system call but...
Tedfelix Acpid 2.0.3
Tedfelix Acpid 2.0.5
Tedfelix Acpid 2.06
Tedfelix Acpid 2.0.7
Tedfelix Acpid
Tedfelix Acpid 1.0.8
Tedfelix Acpid 1.0.10
Tedfelix Acpid 2.0.0
Tedfelix Acpid 2.0.1
Tedfelix Acpid 2.0.2
Tedfelix Acpid 2.0.4
1 EDB exploit
5
CVSSv2
CVE-2009-0798
ACPI Event Daemon (acpid) prior to 1.0.10 allows remote malicious users to cause a denial of service (CPU consumption and connectivity loss) by opening a large number of UNIX sockets without closing them, which triggers an infinite loop.
Tim Hockin Acpid 1.0.2
Tim Hockin Acpid 1.0.1
Tim Hockin Acpid
Tim Hockin Acpid 1.0.6
Tim Hockin Acpid 0.99.1
Tim Hockin Acpid 0.99.0
Tim Hockin Acpid 1.0.0
Tim Hockin Acpid 0.99.4
Tim Hockin Acpid 1.0.4
Tim Hockin Acpid 1.0.3
Tim Hockin Acpid 20010510
6.9
CVSSv2
CVE-2009-4033
A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by ...
Tim Hockin Acpid 1.0.4
6.9
CVSSv2
CVE-2009-4235
acpid 1.0.4 sets an unrestrictive umask, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file or cause a denial of service by overwriting this file, a different vulnerability than CVE-2009-4033.
Tim Hockin Acpid 1.0.4
4.6
CVSSv2
CVE-2011-4578
event.c in acpid (aka acpid2) prior to 2.0.11 does not have an appropriate umask setting during execution of event-handler scripts, which might allow local users to (1) perform write operations within directories created by a script, or (2) read files created by a script, via sta...
Tedfelix Acpid2
Tedfelix Acpid2 2.0.3
Tedfelix Acpid2 2.0.2
Tedfelix Acpid2 2.0.9
Tedfelix Acpid2 2.0.8
Tedfelix Acpid2 2.0.1
Tedfelix Acpid2 2.0.0
Tedfelix Acpid2 2.0.7
Tedfelix Acpid2 2.0.6
Tedfelix Acpid2 2.0.5
Tedfelix Acpid2 2.0.4
4.4
CVSSv2
CVE-2011-2777
samples/powerbtn/powerbtn.sh in acpid (aka acpid2) 2.0.16 and previous versions uses the pidof program incorrectly, which allows local users to gain privileges by running a program with the name kded4 and a DBUS_SESSION_BUS_ADDRESS environment variable containing commands.
Tedfelix Acpid2 2.0.14
Tedfelix Acpid2
Tedfelix Acpid2 2.0.8
Tedfelix Acpid2 2.0.2
Tedfelix Acpid2 2.0.13
Tedfelix Acpid2 2.0.15
Tedfelix Acpid2 2.0.0
Tedfelix Acpid2 2.0.9
Tedfelix Acpid2 2.0.3
Tedfelix Acpid2 2.0.1
Tedfelix Acpid2 2.0.10
Tedfelix Acpid2 2.0.7
Tedfelix Acpid2 2.0.6
Tedfelix Acpid2 2.0.11
Tedfelix Acpid2 2.0.12
Tedfelix Acpid2 2.0.5
Tedfelix Acpid2 2.0.4
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started