CVE-2016-4446

CVSS v3 Score
7.0
High
CVSS v2 Score
6.9
Medium

Vulnerability Description

The allow_execstack plugin for setroubleshoot allows local users to execute arbitrary commands by triggering an execstack SELinux denial with a crafted filename, related to the commands.getoutput function.

CVSS:7.0(High)

The allow_execmod plugin for setroubleshoot before 3.2.23 allows local users to execute arbitrary commands by triggering an execmod SELinux denial with a crafted binary filename, related to the comman...

CWE-772016
CVSS:7.0(High)

The fix_lookup_id function in sealert in setroubleshoot before 3.2.23 allows local users to execute arbitrary commands as root by triggering an SELinux denial with a crafted file name, related to exec...

CWE-772016
CVSS:7.0(High)

setroubleshoot allows local users to bypass an intended container protection mechanism and execute arbitrary commands by (1) triggering an SELinux denial with a crafted file name, which is handled by ...

CWE-772016
CVSS:7.0(High)

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7000v2 before 1.0.0.53, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6700 before 1.0.2.6, R6700v2 be...

CWE-772019
CVSS:7.0(High)

It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special p...

CWE-772020
CVSS:7.0(High)

Windows MSHTML Platform Security Feature Bypass Vulnerability

CWE-772023