Search for vulnerabilities
| Vulnerability ID | VCID-p4ym-jqrt-s7fj |
| Aliases |
CVE-2006-0745
|
| Summary | X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile. |
| Status | Published |
| Exploitability | None |
| Weighted Severity | None |
| Risk | None |
| Affected and Fixed Packages | Package Details |
| There are no known CWE. |
| Reference id | Reference type | URL |
|---|---|---|
| https://api.first.org/data/v1/epss?cve=CVE-2006-0745 | ||
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0745 | ||
| 378465 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=378465 | |
| OSVDB-24000;CVE-2006-0745 | Exploit | https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/1596.txt |
| Data source | Exploit-DB |
|---|---|
| Date added | March 19, 2006 |
| Description | X.Org X11 (X11R6.9.0/X11R7.0) - Local Privilege Escalation |
| Ransomware campaign use | Known |
| Source publication date | March 20, 2006 |
| Exploit type | local |
| Platform | linux |
| Percentile | 0.39097 |
| EPSS Score | 0.00177 |
| Published At | April 1, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T16:30:09.553078+00:00 | Debian Oval Importer | Import | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 38.0.0 |