Описание
Untrusted search path vulnerability in fwsnort before 1.6.4, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnort.conf in the current working directory.
Ссылки
- ExploitPatch
- ExploitPatch
Уязвимые конфигурации
Конфигурация 1Версия до 1.6.4 (включая)
Одно из
cpe:2.3:a:cipherdyne:fwsnort:*:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:0.5:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:0.6:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:0.6.5:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:1.0:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:1.5:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:1.6:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:cipherdyne:fwsnort:1.6.3:*:*:*:*:*:*:*
EPSS
Процентиль: 26%
0.00088
Низкий
4.4 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
ubuntu
больше 11 лет назад
Untrusted search path vulnerability in fwsnort before 1.6.4, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnort.conf in the current working directory.
debian
больше 11 лет назад
Untrusted search path vulnerability in fwsnort before 1.6.4, when not ...
github
около 3 лет назад
Untrusted search path vulnerability in fwsnort before 1.6.4, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnort.conf in the current working directory.
EPSS
Процентиль: 26%
0.00088
Низкий
4.4 Medium
CVSS2
Дефекты
NVD-CWE-Other