4 results (0.001 seconds)

CVSS: 10.0EPSS: 26%CPEs: 1EXPL: 1

25 Feb 2011 — logwatch.pl in Logwatch 7.3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in a log file name, as demonstrated via a crafted username to a Samba server. logwatch.pl en Logwatch v7.3.6 permite a atacantes remotos ejecutar comandos arbitrarios vía metacaracteres shell en un nombre de archivo de registro, como se demostró a través de un nombre de usuario manipulado en un servidor Samba. • https://www.exploit-db.com/exploits/35386 • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.5EPSS: 3%CPEs: 5EXPL: 1

21 Apr 2005 — The secure script in LogWatch before 2.6-2 allows attackers to prevent LogWatch from detecting malicious activity via certain strings in the secure file that are later used as part of a regular expression, which causes the parser to crash, aka "logwatch log processing regular expression DoS." • https://www.exploit-db.com/exploits/25465 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

03 Apr 2002 — LogWatch 2.5 allows local users to gain root privileges via a symlink attack, a different vulnerability than CVE-2002-0162. Log Watch 2.5 permite a usuarios locales obtener privilegios de root mediante un ataque de enlaces simbólicos. • http://list.kaybee.org/archives/logwatch-announce/2002-March/000003.html •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

27 Mar 2002 — LogWatch before 2.5 allows local users to execute arbitrary code via a symlink attack on the logwatch temporary directory. LogWatch 2.1.1 y anteriores permiten a usuarios locales ejecutar código arbitrario mediante un ataque de enlaces simbólicos en el directorio temporal de de LogWatch. • https://www.exploit-db.com/exploits/21356 •