Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
rpath vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2008-3138
The (1) PANA and (2) KISMET dissectors in Wireshark (formerly Ethereal) 0.99.3 up to and including 1.0.0 allow remote malicious users to cause a denial of service (application stop) via unknown vectors.
Wireshark Wireshark 0.99.4
Wireshark Wireshark 0.99.5
Rpath Rpath Linux 1
Wireshark Wireshark 0.99.8
Wireshark Wireshark 1.0
Wireshark Wireshark 0.9.5
Wireshark Wireshark 0.99.2
Wireshark Wireshark 0.99.3
Wireshark Wireshark 1.0.0
Wireshark Wireshark 0.99.6
Wireshark Wireshark 0.99.7
4.9
CVSSv2
CVE-2007-5686
initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts. NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents s...
Rpath Rpath Linux 1
2 Github repositories
4.6
CVSSv2
CVE-2020-26947
monero-wallet-gui in Monero GUI prior to 0.17.1.0 includes the . directory in an embedded RPATH (with a preference ahead of /usr/lib), which allows local users to gain privileges via a Trojan horse library in the current working directory.
Getmonero Monero
4.6
CVSSv2
CVE-2008-3278
frysk packages through 2008-08-05 as shipped in Red Hat Enterprise Linux 5 are built with an insecure RPATH set in the ELF header of multiple binaries in /usr/bin/f* (e.g. fcore, fcatch, fstack, fstep, ...) shipped in the package. A local attacker can exploit this vulnerability b...
Redhat Frysk
4.6
CVSSv2
CVE-2019-4473
Multiple binaries in IBM SDK, Java Technology Edition 7, 7R, and 8 on the AIX platform use insecure absolute RPATHs, which may facilitate code injection and privilege elevation by local users. IBM X-Force ID: 163984.
Ibm Java 7.0.0.0
Ibm Java 8.0
Ibm Java 7.1.4.50
4.6
CVSSv2
CVE-2019-11771
AIX builds of Eclipse OpenJ9 prior to 0.15.0 contain unused RPATHs which may facilitate code injection and privilege elevation by local users.
Eclipse Openj9
4.6
CVSSv2
CVE-2009-0521
Untrusted search path vulnerability in Adobe Flash Player 9.x prior to 9.0.159.0 and 10.x prior to 10.0.22.87 on Linux allows local users to obtain sensitive information or gain privileges via a crafted library in a directory contained in the RPATH.
Adobe Flash Player For Linux
Adobe Flash Player For Linux 10.0.12.36
4.6
CVSSv2
CVE-2008-1951
Untrusted search path vulnerability in a certain Red Hat build script for Standards Based Linux Instrumentation for Manageability (sblim) libraries prior to 1-13a.el4_6.1 in Red Hat Enterprise Linux (RHEL) 4, and prior to 1-31.el5_2.1 in RHEL 5, allows local users to gain privile...
Redhat Enterprise Linux 4
Redhat Enterprise Linux 5
4.6
CVSSv2
CVE-2006-1564
Untrusted search path vulnerability in libapache2-svn 1.3.0-4 for Subversion in Debian GNU/Linux includes RPATH values under the /tmp/svn directory for the (1) mod_authz_svn.so and (2) mod_dav_svn.so modules, which might allow local users to gain privileges by installing maliciou...
Debian Debian Linux 3.1
4.6
CVSSv2
CVE-2006-1565
Untrusted search path vulnerability in libgpib-perl 3.2.06-2 in Debian GNU/Linux includes an RPATH value under the /tmp/buildd directory for the LinuxGpib.so module, which might allow local users to gain privileges by installing malicious libraries in that directory.
Debian Debian Linux 3.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »