Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-5986

Опубликовано: 28 янв. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.9

Описание

Untrusted search path vulnerability in the (1) "VST plugin with Python scripting" and (2) "VST plugin for writing score generators in Python" in Csound 5.08.2, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

gutsy

ignored

end of life, was needed
hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

not-affected

1:5.08.2~dfsg-1.1ubuntu2
karmic

not-affected

lucid

not-affected

maverick

not-affected

natty

not-affected

Показывать по

Ссылки на источники

EPSS

Процентиль: 19%
0.00059
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

Untrusted search path vulnerability in the (1) "VST plugin with Python scripting" and (2) "VST plugin for writing score generators in Python" in Csound 5.08.2, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

nvd
около 17 лет назад

Untrusted search path vulnerability in the (1) "VST plugin with Python scripting" and (2) "VST plugin for writing score generators in Python" in Csound 5.08.2, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

debian
около 17 лет назад

Untrusted search path vulnerability in the (1) "VST plugin with Python ...

github
больше 3 лет назад

Untrusted search path vulnerability in the (1) "VST plugin with Python scripting" and (2) "VST plugin for writing score generators in Python" in Csound 5.08.2, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

EPSS

Процентиль: 19%
0.00059
Низкий

6.9 Medium

CVSS2