Page 5 of 28 results (0.010 seconds)

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 1

The KDE kscd program does not drop privileges when executing a program specified in a user's SHELL environmental variable, which allows the user to gain privileges by specifying an alternate program to execute. • https://www.exploit-db.com/exploits/19915 http://archives.neohapsis.com/archives/bugtraq/2000-05/0172.html http://www.novell.com/linux/security/advisories/suse_security_announce_50.html http://www.securityfocus.com/bid/1206 •

CVSS: 1.2EPSS: 0%CPEs: 2EXPL: 1

The libmediatool library used for the KDE mediatool allows local users to create arbitrary files via a symlink attack. La librería libmediatool usada para el mediatool de KDE permite a usuarios locales crear ficheros arbitrarios mediante un ataque de enlaces simbólicos (symlink attack) • ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-005.0.txt http://www.securityfocus.com/bid/1269 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

KDE allows local users to execute arbitrary commands by setting the KDEDIR environmental variable to modify the search path that KDE uses to locate its executables. • http://marc.info/?l=bugtraq&m=91141486301691&w=2 •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

KDE kppp allows local users to create a directory in an arbitrary location via the HOME environmental variable. • http://marc.info/?l=bugtraq&m=91141486301691&w=2 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in kppp in KDE allows local users to gain root access via a long PATH environmental variable. • http://marc.info/?l=bugtraq&m=91141486301691&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/1650 •