Total vulnerabilities in the database
Vulnerability in crontab allows local users to read crontab files of other users by replacing the temporary file that is being edited while crontab is running.
CVSS v2:
No CWE or OWASP classifications available.