296,733
Total vulnerabilities in the database
Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
| Software | From | Fixed in |
|---|---|---|
| sgi / propack | 3.0 | 3.0.x |
| utempter / utempter | 0.5.2 | 0.5.2.x |
| utempter / utempter | 0.5.3 | 0.5.3.x |
| sgi / propack | 2.4 | 2.4.x |
| slackware / slackware_linux | 9.1 | 9.1.x |
| slackware / slackware_linux | - | - |