Debian Lintian Multiple Local Vulnerabilities

To exploit these issues, an attacker can use readily available command-line utilities.


 

Privacy Statement
Copyright 2010, SecurityFocus