4 results (0.004 seconds)

CVSS: 10.0EPSS: 6%CPEs: 1EXPL: 1

logwatch.pl in Logwatch 7.3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in a log file name, as demonstrated via a crafted username to a Samba server. logwatch.pl en Logwatch v7.3.6 permite a atacantes remotos ejecutar comandos arbitrarios vía metacaracteres shell en un nombre de archivo de registro, como se demostró a través de un nombre de usuario manipulado en un servidor Samba. • https://www.exploit-db.com/exploits/35386 http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055579.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055585.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055617.html http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html http://logwatch.svn.sourceforge.net/viewvc/logwatch/scripts/logwatch.pl?r1=3&r2=26&pathrev=26 http://secunia.com/advisories/43356 http://secunia& • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 1

The secure script in LogWatch before 2.6-2 allows attackers to prevent LogWatch from detecting malicious activity via certain strings in the secure file that are later used as part of a regular expression, which causes the parser to crash, aka "logwatch log processing regular expression DoS." • https://www.exploit-db.com/exploits/25465 http://www.redhat.com/support/errata/RHSA-2005-364.html https://bugzilla.redhat.com/bugzilla-old/show_bug.cgi?id=137502 https://access.redhat.com/security/cve/CVE-2005-1061 https://bugzilla.redhat.com/show_bug.cgi?id=1617603 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

LogWatch 2.5 allows local users to gain root privileges via a symlink attack, a different vulnerability than CVE-2002-0162. Log Watch 2.5 permite a usuarios locales obtener privilegios de root mediante un ataque de enlaces simbólicos. • http://list.kaybee.org/archives/logwatch-announce/2002-March/000003.html http://marc.info/?l=bugtraq&m=101787227513000&w=2 http://www.iss.net/security_center/static/8652.php •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 1

LogWatch before 2.5 allows local users to execute arbitrary code via a symlink attack on the logwatch temporary directory. LogWatch 2.1.1 y anteriores permiten a usuarios locales ejecutar código arbitrario mediante un ataque de enlaces simbólicos en el directorio temporal de de LogWatch. • https://www.exploit-db.com/exploits/21356 http://list.kaybee.org/archives/logwatch-announce/2002-March/000002.html http://marc.info/?l=bugtraq&m=101724766216872 http://online.securityfocus.com/archive/82/264233 http://www.iss.net/security_center/static/8652.php http://www.securityfocus.com/bid/4374 •