NVD List
| Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
|---|---|---|---|---|---|---|---|---|---|
| 47024 | CVE-2012-6068 | The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to (1) execute commands via the command-line interface in the TCP listener service or (2) transfer files via requests to the TCP listener service. | 2 | 10 | High | 2017-01-19 | 2014-05-05 | View | |
| 25490 | CVE-2015-3865 | The Runtime subsystem in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23050463. | 2 | 9.3 | High | 2017-01-19 | 2015-10-07 | View | |
| 10598 | CVE-2011-4060 | The runtime linker in QNX Neutrino RTOS 6.5.0 does not properly clear the LD_DEBUG_OUTPUT and LD_DEBUG environment variables when a program is spawned from a setuid program, which allows local users to overwrite files via a symlink attack. | 2 | 3.3 | Low | 2017-01-07 | 2012-02-13 | View | |
| 31340 | CVE-2014-3074 | The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program. | 2 | 7.2 | High | 2017-01-19 | 2017-01-06 | View | |
| 67781 | CVE-2005-2072 | The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT. | 2 | 7.2 | High | 2017-01-03 | 2011-10-11 | View |
Page 3274 of 17672, showing 5 records out of 88360 total, starting on record 16366, ending on 16370