8 results (0.005 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

linux vserver 2.6 before 2.6.17 suffers from privilege escalation in remount code. Linux vserver versiones 2.6 anteriores a 2.6.17, sufre de escalada de privilegios en el código remount. • https://security-tracker.debian.org/tracker/CVE-2006-4243 • CWE-269: Improper Privilege Management •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

vserver in util-vserver 0.30.209 executes a command as root when the suexec userid parameter is invalid and non-numeric, which might cause local users to inadvertently execute dangerous commands as root. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=360438 http://www.securityfocus.com/bid/17361 https://savannah.nongnu.org/bugs/?func=detailitem&item_id=15996 https://savannah.nongnu.org/patch/?func=detailitem&item_id=4966 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

util-vserver before 0.30.208-1 with kernel-patch-vserver before 1.9.5.5 and 2.x before 2.3 for Debian GNU/Linux sets a default policy that trusts unknown capabilities, which could allow local users to conduct unauthorized activities. • http://secunia.com/advisories/19333 http://secunia.com/advisories/19339 http://www.debian.org/security/2006/dsa-1011 http://www.securityfocus.com/bid/17180 https://exchange.xforce.ibmcloud.com/vulnerabilities/25407 •

CVSS: 6.2EPSS: 0%CPEs: 280EXPL: 0

Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://linux.bkbits.net:8080/linux-2.6/cset%4041ddda70CWJb5nNL71T4MOlG2sMG8A http://marc.info/?l=full-disclosure&m=110846102231365&w=2 http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/bid/12598 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10647 https://access.redhat.com/security/cve/CVE-2005-0178 https://bugzilla.redhat.com/show_bug.cgi? •

CVSS: 3.6EPSS: 0%CPEs: 19EXPL: 0

Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of service on other virtual servers or the host server. • http://archives.neohapsis.com/archives/bugtraq/2004-07/0040.html http://linux-vserver.org/ChangeLog http://secunia.com/advisories/12021 http://securitytracker.com/id?1010643 http://www.osvdb.org/7480 http://www.securityfocus.com/bid/10660 https://exchange.xforce.ibmcloud.com/vulnerabilities/16626 •