Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-0317

Опубликовано: 28 янв. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.9

Описание

Untrusted search path vulnerability in the Python language bindings for Nautilus (nautilus-python) allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

0.6.1-1
gutsy

ignored

end of life, was needed
hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

ignored

end of life
karmic

ignored

end of life
lucid

not-affected

0.6.1-1
maverick

not-affected

0.6.1-1
natty

not-affected

0.6.1-1

Показывать по

Ссылки на источники

EPSS

Процентиль: 44%
0.00216
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

Untrusted search path vulnerability in the Python language bindings for Nautilus (nautilus-python) allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

nvd
около 17 лет назад

Untrusted search path vulnerability in the Python language bindings for Nautilus (nautilus-python) allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

debian
около 17 лет назад

Untrusted search path vulnerability in the Python language bindings fo ...

github
почти 4 года назад

Untrusted search path vulnerability in the Python language bindings for Nautilus (nautilus-python) allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

EPSS

Процентиль: 44%
0.00216
Низкий

6.9 Medium

CVSS2