Abuse is reported prone to multiple vulnerabilities. The following individual issues are reported: Abuse is reported prone to multiple local buffer overflow vulnerabilities. It is reported that a local attacker may exploit these issues to execute arbitrary code with superuser privileges. Abuse is also reported prone to an insecure file creation vulnerability. Reports indicate that this issue may be leveraged to overwrite arbitrary files with superuser privileges.
Abuse is reported prone to multiple vulnerabilities. The following individual issues are reported: Abuse is reported prone to multiple local buffer overflow vulnerabilities. It is reported that a local attacker may exploit these issues to execute arbitrary code with superuser privileges. Abuse is also reported prone to an insecure file creation vulnerability. Reports indicate that this issue may be leveraged to overwrite arbitrary files with superuser privileges.