Untrusted search path vulnerability in Beagle 0.2.2.1 might allow local users to gain privileges via a malicious beagle-info program in the current working directory, or possibly directories specified in the PATH.
References
Configurations
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=357392 - | |
References | () http://secunia.com/advisories/19278 - Vendor Advisory | |
References | () http://secunia.com/advisories/19336 - | |
References | () http://www.osvdb.org/23942 - | |
References | () http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00047.html - | |
References | () http://www.securityfocus.com/bid/17195 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25303 - |
Information
Published : 2006-03-19 23:02
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1296
Mitre link : CVE-2006-1296
CVE.ORG link : CVE-2006-1296
JSON object : View
Products Affected
beagle-project
- beagle
CWE