Vulnerabilities
Vulnerable Software
Utempter:  >> Utempter  >> 0.5.2  Security Vulnerabilities
Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
CVSS Score
2.1
EPSS Score
0.002
Published
2004-08-18


Contact Us

Shodan ® - All rights reserved