Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-62w8-6xpw-2cc6

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The default configuration of SLiM before 1.3.2 places ./ (dot slash) at the beginning of the default_path option, which might allow local users to gain privileges via a Trojan horse program in the current working directory, related to slim.conf and cfg.cpp.

The default configuration of SLiM before 1.3.2 places ./ (dot slash) at the beginning of the default_path option, which might allow local users to gain privileges via a Trojan horse program in the current working directory, related to slim.conf and cfg.cpp.

EPSS

Процентиль: 14%
0.00045
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The default configuration of SLiM before 1.3.2 places ./ (dot slash) at the beginning of the default_path option, which might allow local users to gain privileges via a Trojan horse program in the current working directory, related to slim.conf and cfg.cpp.

nvd
больше 15 лет назад

The default configuration of SLiM before 1.3.2 places ./ (dot slash) at the beginning of the default_path option, which might allow local users to gain privileges via a Trojan horse program in the current working directory, related to slim.conf and cfg.cpp.

debian
больше 15 лет назад

The default configuration of SLiM before 1.3.2 places ./ (dot slash) a ...

EPSS

Процентиль: 14%
0.00045
Низкий