Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-2095

Опубликовано: 26 фев. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.6

Описание

Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0, when a Fedora package such as 0.8.2-1 is not used, allows local users to gain privileges via a Trojan horse bin/catfish.pyc under the current working directory.

РелизСтатусПримечание
devel

not-affected

esm-apps/xenial

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [1.0.1-1]]
lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
saucy

ignored

end of life
trusty

not-affected

1.0.1-1
trusty/esm

DNE

trusty was not-affected [1.0.1-1]

Показывать по

EPSS

Процентиль: 21%
0.00066
Низкий

4.6 Medium

CVSS2

Связанные уязвимости

nvd
почти 12 лет назад

Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0, when a Fedora package such as 0.8.2-1 is not used, allows local users to gain privileges via a Trojan horse bin/catfish.pyc under the current working directory.

debian
почти 12 лет назад

Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0, wh ...

github
больше 3 лет назад

Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0, when a Fedora package such as 0.8.2-1 is not used, allows local users to gain privileges via a Trojan horse bin/catfish.pyc under the current working directory.

fstec
больше 11 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 21%
0.00066
Низкий

4.6 Medium

CVSS2