Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-2945

Опубликовано: 30 авг. 2010
Источник: debian
EPSS Низкий

Описание

The default configuration of SLiM before 1.3.2 places ./ (dot slash) at the beginning of the default_path option, which might allow local users to gain privileges via a Trojan horse program in the current working directory, related to slim.conf and cfg.cpp.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
slimfixed1.3.1-7package
slimfixed1.3.0-1+lenny3lennypackage

EPSS

Процентиль: 14%
0.00045
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The default configuration of SLiM before 1.3.2 places ./ (dot slash) at the beginning of the default_path option, which might allow local users to gain privileges via a Trojan horse program in the current working directory, related to slim.conf and cfg.cpp.

nvd
больше 15 лет назад

The default configuration of SLiM before 1.3.2 places ./ (dot slash) at the beginning of the default_path option, which might allow local users to gain privileges via a Trojan horse program in the current working directory, related to slim.conf and cfg.cpp.

github
больше 3 лет назад

The default configuration of SLiM before 1.3.2 places ./ (dot slash) at the beginning of the default_path option, which might allow local users to gain privileges via a Trojan horse program in the current working directory, related to slim.conf and cfg.cpp.

EPSS

Процентиль: 14%
0.00045
Низкий