tools/url_handler.pl in TIN 2.4.1 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a third party has reported that this is intentional behavior,...
8.8CVSS
8.6AI Score
0.002EPSS
Multiple buffer overflows in TIN before 1.8.2 have unspecified impact and attack vectors, a different vulnerability than...
6.8AI Score
0.002EPSS
Off-by-one error in TIN 1.8.0 and earlier might allow attackers to execute arbitrary code via unknown vectors that trigger a buffer...
7.5AI Score
0.011EPSS
UNIX news readers tin and rtin create the /tmp/.tin_log file with insecure permissions and follow symlinks, which allows attackers to modify the permissions of files writable by the user via a symlink...
7.3AI Score
0.003EPSS
tin 1.40 creates the .tin directory with insecure permissions, which allows local users to read passwords from the .inputhistory...
6.9AI Score
0.0004EPSS