Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r26m-hp24-85qr

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Untrusted search path vulnerability in the Python language bindings for Nautilus (nautilus-python) allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

Untrusted search path vulnerability in the Python language bindings for Nautilus (nautilus-python) allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

EPSS

Процентиль: 44%
0.00216
Низкий

Связанные уязвимости

ubuntu
почти 17 лет назад

Untrusted search path vulnerability in the Python language bindings for Nautilus (nautilus-python) allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

redhat
больше 17 лет назад

Untrusted search path vulnerability in the Python language bindings for Nautilus (nautilus-python) allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

nvd
почти 17 лет назад

Untrusted search path vulnerability in the Python language bindings for Nautilus (nautilus-python) allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

debian
почти 17 лет назад

Untrusted search path vulnerability in the Python language bindings fo ...

EPSS

Процентиль: 44%
0.00216
Низкий