Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-3949

Опубликовано: 24 авг. 2008
Источник: redhat
EPSS Низкий

Описание

emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.

Отчет

Not vulnerable. This issue did not affect the versions of the emacs package, as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=462694emacs: Python interactive shell arbitrary code execution

EPSS

Процентиль: 23%
0.00073
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.

nvd
около 17 лет назад

emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.

debian
около 17 лет назад

emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python s ...

github
больше 3 лет назад

emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.

EPSS

Процентиль: 23%
0.00073
Низкий