Total vulnerabilities in the database
lv reads a .lv file from the current working directory, which allows local users to execute arbitrary commands as other lv users by placing malicious .lv files into other directories.
Software | From | Fixed in |
---|---|---|
redhat / lv | 4.49.4-3 | 4.49.4-3.x |
lv / lv | 4.49.1 | 4.49.1.x |
redhat / lv | 4.49.4-9 | 4.49.4-9.x |
redhat / lv | 4.49.4-7 | 4.49.4-7.x |
lv / lv | 4.49.2 | 4.49.2.x |
lv / lv | 4.49.4 | 4.49.4.x |
lv / lv | 4.49.3 | 4.49.3.x |
redhat / lv | 4.49.4-1 | 4.49.4-1.x |
redhat / linux | 7.2 | 7.2.x |
redhat / linux | 8.0 | 8.0.x |
redhat / linux | 7.3 | 7.3.x |
redhat / linux | 9.0 | 9.0.x |
redhat / linux | 7.1 | 7.1.x |