Page 76 of 377 results (0.009 seconds)

CVSS: 6.0EPSS: 0%CPEs: 14EXPL: 0

(1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm. El (1) xenbaked y el (2) xenmon.py en el Xen 3.1 y versiones anteriores permite a usuarios locales truncar ficheros de su elección a través de un ataque de enlaces simbólicos en el /tmp/xenq-shm. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447795 http://osvdb.org/41342 http://osvdb.org/41343 http://secunia.com/advisories/27389 http://secunia.com/advisories/27408 http://secunia.com/advisories/27486 http://secunia.com/advisories/27497 http://secunia.com/advisories/29963 http://www.debian.org/security/2007/dsa-1395 http://www.mandriva.com/security/advisories?name=MDKSA-2007:203 http://www.redhat.com/support/errata/RHSA-2008-0194.html http://www.securit • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-377: Insecure Temporary File •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 1

pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest domain, allows local users with elevated privileges in the guest domain to execute arbitrary commands in domain 0 via a crafted grub.conf file whose contents are used in exec statements. pygrub (tools/pygrub/src/GrubConf.py) en Xen 3.0.3, en el arranque de un dominio invitado, permite a usuarios locales con privilegios elevados en el dominio invitado ejecutar comandos de su elección en el dominio 0 mediante un fichero grub.conf manipulado artesanalmente cuyo contenido es utilizado en sentencias exec. • https://www.exploit-db.com/exploits/30620 http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1068 http://secunia.com/advisories/26986 http://secunia.com/advisories/27047 http://secunia.com/advisories/27072 http://secunia.com/advisories/27085 http://secunia.com/advisories/27103 http://secunia.com/advisories/27141 http://secunia.com/advisories/27161 http://secunia.com/advisories/27486 http://www.debian.org/security/2007/dsa-1384 http://www.mandriva.com/security/advisor • CWE-20: Improper Input Validation •