Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2001-0125
exmh 2.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the exmhErrorMsg temporary file.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.001
EPSS Ranking
23.8%
CVSS Severity
CVSS v2 Score
1.2
References
http://archives.neohapsis.com/archives/freebsd/2001-01/0543.html
http://marc.info/?l=bugtraq&m=97846489313059&w=2
http://marc.info/?l=bugtraq&m=97958594330100&w=2
http://www.beedub.com/exmh/symlink.html
http://www.debian.org/security/2001/dsa-022
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-015.php3
https://exchange.xforce.ibmcloud.com/vulnerabilities/5829
http://archives.neohapsis.com/archives/freebsd/2001-01/0543.html
http://marc.info/?l=bugtraq&m=97846489313059&w=2
http://marc.info/?l=bugtraq&m=97958594330100&w=2
http://www.beedub.com/exmh/symlink.html
http://www.debian.org/security/2001/dsa-022
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-015.php3
https://exchange.xforce.ibmcloud.com/vulnerabilities/5829
Products affected by CVE-2001-0125
Exmh
»
Exmh
»
Version:
Any
cpe:2.3:a:exmh:exmh:*
Debian
»
Debian Linux
»
Version:
2.2
cpe:2.3:o:debian:debian_linux:2.2
Mandrakesoft
»
Mandrake Linux
»
Version:
6.0
cpe:2.3:o:mandrakesoft:mandrake_linux:6.0
Mandrakesoft
»
Mandrake Linux
»
Version:
6.1
cpe:2.3:o:mandrakesoft:mandrake_linux:6.1
Mandrakesoft
»
Mandrake Linux
»
Version:
7.0
cpe:2.3:o:mandrakesoft:mandrake_linux:7.0
Mandrakesoft
»
Mandrake Linux
»
Version:
7.1
cpe:2.3:o:mandrakesoft:mandrake_linux:7.1
Mandrakesoft
»
Mandrake Linux
»
Version:
7.2
cpe:2.3:o:mandrakesoft:mandrake_linux:7.2
Mandrakesoft
»
Mandrake Linux Corporate Server
»
Version:
1.0.1
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:1.0.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved