hylafaxplus is vulnerable to arbitrary code execution. The vulnerability exists as HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).
lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html
lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html
lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html
lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html
bugzilla.suse.com/show_bug.cgi?id=1173519
lists.fedoraproject.org/archives/list/[email protected]/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/
lists.fedoraproject.org/archives/list/[email protected]/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L/
security.gentoo.org/glsa/202007-06
sourceforge.net/p/hylafax/HylaFAX+/2534/