Loading...
Loading...
IBM Lotus Notes 8 for Linux before 8.0.1 uses (1) unspecified weak permissions for the installation kit obtained through a Notes 8 download and (2) 0777 permissions for the installdata file that is created by setup.sh, which allows local users to gain privileges via a Trojan horse file.
December 28, 2007
April 23, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2007-6594
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.