Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2004-0256
GNU libtool before 1.5.2, during compile time, allows local users to overwrite arbitrary files via a symlink attack on libtool directories in /tmp.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.001
EPSS Ranking
28.6%
CVSS Severity
CVSS v2 Score
2.1
References
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000811
http://secunia.com/advisories/10777
http://www.geocrawler.com/mail/msg.php3?msg_id=3438808&list=405
http://www.osvdb.org/3795
http://www.securityfocus.com/archive/1/352333
http://www.securityfocus.com/bid/9530
https://exchange.xforce.ibmcloud.com/vulnerabilities/15017
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000811
http://secunia.com/advisories/10777
http://www.geocrawler.com/mail/msg.php3?msg_id=3438808&list=405
http://www.osvdb.org/3795
http://www.securityfocus.com/archive/1/352333
http://www.securityfocus.com/bid/9530
https://exchange.xforce.ibmcloud.com/vulnerabilities/15017
Products affected by CVE-2004-0256
Gnu
»
Libtool
»
Version:
1.0
cpe:2.3:a:gnu:libtool:1.0
Gnu
»
Libtool
»
Version:
1.1
cpe:2.3:a:gnu:libtool:1.1
Gnu
»
Libtool
»
Version:
1.2
cpe:2.3:a:gnu:libtool:1.2
Gnu
»
Libtool
»
Version:
1.3
cpe:2.3:a:gnu:libtool:1.3
Gnu
»
Libtool
»
Version:
1.3.2
cpe:2.3:a:gnu:libtool:1.3.2
Gnu
»
Libtool
»
Version:
1.3.3
cpe:2.3:a:gnu:libtool:1.3.3
Gnu
»
Libtool
»
Version:
1.3.4
cpe:2.3:a:gnu:libtool:1.3.4
Gnu
»
Libtool
»
Version:
1.3.5
cpe:2.3:a:gnu:libtool:1.3.5
Gnu
»
Libtool
»
Version:
1.4
cpe:2.3:a:gnu:libtool:1.4
Gnu
»
Libtool
»
Version:
1.4.1
cpe:2.3:a:gnu:libtool:1.4.1
Gnu
»
Libtool
»
Version:
1.4.2
cpe:2.3:a:gnu:libtool:1.4.2
Gnu
»
Libtool
»
Version:
1.4.3
cpe:2.3:a:gnu:libtool:1.4.3
Gnu
»
Libtool
»
Version:
1.5
cpe:2.3:a:gnu:libtool:1.5
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved