This file is indexed.

/usr/lib/tiger/html/embed.html is in tiger 1:3.2.3-10.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
<HR><PRE>








</PRE><HR>
<CENTER><H2> Documents for embed</H2></CENTER>
<A NAME="embed"><P><B>Code [embed]</B><P>
The embedded references are formatted as
<P>
pathname_1->pathname_2->pathname_3...
<P>
which indicates that pathname_1 is a string embedded in the
binary pointed to by pathname_2, which in turn is a string
embedded in pathname_3. Or, to read it the other way around,
pathname_3 refers to pathname_2 which refers to pathname_1.
<PRE>










</PRE><HR>
<A NAME="embed001w"><P><B>Code [embed001w]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The indicated pathname to an executable contains a component which is not
owned by root. This can enable an intruder to gain unauthorized privileges
if they are able to replace the binary. See the 'rationale' explanation
for a discussion of the reasons that executables run by root should be
owned by root.
<PRE>










</PRE><HR>
<A NAME="embed001i"><P><B>Code [embed001i]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The indicated pathname to a file or directory contains a component which
is not owned by root. This may indicate a vulnerability in the system.
It will be necessary to study the programs in which the pathname was
found to determine whether there is a problem.
<PRE>










</PRE><HR>
<A NAME="embed002w"><P><B>Code [embed002w]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The indicated executable is not owned by owned by root. This can
enable an intruder to gain unauthorized privileges if they are able to
overwrite the executable. See the 'rationale' explanation for a
discussion of the reasons that executables run by root should be owned
by root.
<P>
Note that if the executable is setuid to a non-root ID, then the
ownershop should *NOT* be changed to root unless the setuid bit
is also removed.
<PRE>










</PRE><HR>
<A NAME="embed002i"><P><B>Code [embed002i]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The indicated file or directory is not owned by root. This may
indicate a vulnerability in the system. It will be necessary to study
the programs in which the pathname was found to determine whether
there is a problem.
<PRE>










</PRE><HR>
<A NAME="embed003w"><P><B>Code [embed003w]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The indicated pathname to an executable contains a component which
is group writable, world writable or both. This can enable an intruder
to gain unauthorized privileges if they are able to replace the
executable.
<PRE>










</PRE><HR>
<A NAME="embed003i"><P><B>Code [embed003i]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The indicated pathname to a file or directory contains a component
which is group writable, world writable or both. This may indicate a
vulnerability in the system. It will be necessary to study the file
and programs in which the pathname was found to determine whether
there is a problem.
<PRE>










</PRE><HR>
<A NAME="embed004w"><P><B>Code [embed004w]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The executable is group writable, world writable or both. This can
enable an intruder to gain unauthorized privileges if they are able to
overwrite the executable.
<PRE>










</PRE><HR>
<A NAME="embed004i"><P><B>Code [embed004i]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The file or directory is group writable, world writable or both. This
may indicate a vulnerability in the system. It will be necessary to
study the file and programs in which the pathname was found to
determine whether there is a problem.