Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-0415

Опубликовано: 03 фев. 2009
Источник: debian
EPSS Низкий

Описание

Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tricklefixed1.07-6package
trickleno-dsaetchpackage

EPSS

Процентиль: 25%
0.00083
Низкий

Связанные уязвимости

ubuntu
почти 17 лет назад

Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.

redhat
почти 17 лет назад

Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.

nvd
почти 17 лет назад

Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.

github
больше 3 лет назад

Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.

EPSS

Процентиль: 25%
0.00083
Низкий