Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-5652

Опубликовано: 06 окт. 2015
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.2

Описание

Untrusted search path vulnerability in python.exe in Python through 3.5.0 on Windows allows local users to gain privileges via a Trojan horse readline.pyd file in the current working directory. NOTE: the vendor says "It was determined that this is a longtime behavior of Python that cannot really be altered at this point."

РелизСтатусПримечание
bionic

not-affected

Windows only
cosmic

not-affected

Windows only
devel

not-affected

Windows only
esm-infra-legacy/trusty

not-affected

Windows only
esm-infra/bionic

not-affected

Windows only
esm-infra/xenial

not-affected

Windows only
precise

not-affected

Windows only
precise/esm

not-affected

Windows only
trusty

not-affected

Windows only
trusty/esm

not-affected

Windows only

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

Windows only
trusty

DNE

trusty/esm

DNE

upstream

needed

vivid

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

cosmic

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

Windows only
precise

DNE

precise/esm

DNE

trusty

not-affected

Windows only
trusty/esm

not-affected

Windows only
upstream

needed

vivid

not-affected

Windows only

Показывать по

РелизСтатусПримечание
bionic

DNE

cosmic

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

Windows only
esm-infra/xenial

not-affected

Windows only
precise

DNE

precise/esm

DNE

trusty

not-affected

Windows only
trusty/esm

not-affected

Windows only
upstream

needed

Показывать по

EPSS

Процентиль: 37%
0.0015
Низкий

7.2 High

CVSS2

Связанные уязвимости

nvd
больше 9 лет назад

Untrusted search path vulnerability in python.exe in Python through 3.5.0 on Windows allows local users to gain privileges via a Trojan horse readline.pyd file in the current working directory. NOTE: the vendor says "It was determined that this is a longtime behavior of Python that cannot really be altered at this point."

github
около 3 лет назад

Untrusted search path vulnerability in python.exe in Python through 3.5.0 on Windows allows local users to gain privileges via a Trojan horse readline.pyd file in the current working directory. NOTE: the vendor says "It was determined that this is a longtime behavior of Python that cannot really be altered at this point."

EPSS

Процентиль: 37%
0.0015
Низкий

7.2 High

CVSS2