Page 36 of 196 results (0.007 seconds)

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

klprfax_filter in KDE2 KDEUtils allows local users to overwrite arbitrary files via a symlink attack on the klprfax.filter temporary file. klprfax_filter en KDE2 KDEUtils permite a usuarios locales la sobreescritura de ficheros mediante un ataque de enlaces simbólicos (symlink attack) en el fichero temporal klprfax.filter. • http://marc.info/?l=bugtraq&m=100837486611350&w=2 http://www.securityfocus.com/archive/1/245500 http://www.securityfocus.com/bid/3694 https://exchange.xforce.ibmcloud.com/vulnerabilities/7700 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

KDE ktvision 0.1.1-271 and earlier allows local attackers to gain root privileges via a symlink attack on a user configuration file. • https://www.exploit-db.com/exploits/20961 http://archives.neohapsis.com/archives/bugtraq/2001-06/0302.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6741 •

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 1

kfm as included with KDE 1.x can allow a local attacker to gain additional privileges via a symlink attack in the kfm cache directory in /tmp. • https://www.exploit-db.com/exploits/20781 http://archives.neohapsis.com/archives/bugtraq/2001-04/0336.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6428 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Format string vulnerability in kvt in KDE 1.1.2 may allow local users to execute arbitrary commands via a DISPLAY environmental variable that contains formatting characters. • http://www.securityfocus.com/archive/1/83914 http://www.securityfocus.com/bid/1700 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 5

The KApplication class in the KDE 1.1.2 configuration file management capability allows local users to overwrite arbitrary files. • https://www.exploit-db.com/exploits/19979 https://www.exploit-db.com/exploits/19980 https://www.exploit-db.com/exploits/19981 ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-015.0.txt http://archives.neohapsis.com/archives/bugtraq/2000-05/0387.html http://www.redhat.com/support/errata/RHSA-2000-032.html http://www.securityfocus.com/bid/1291 https://exchange.xforce.ibmcloud.com/vulnerabilities/4583 •