Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-3958

Опубликовано: 23 мая 2016
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.2
CVSS3: 7.8

Описание

Untrusted search path vulnerability in Go before 1.5.4 and 1.6.x before 1.6.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, related to use of the LoadLibrary function.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [windows only]]
precise

not-affected

windows only
trusty

not-affected

windows only
trusty/esm

DNE

trusty was not-affected [windows only]
upstream

needs-triage

vivid/stable-phone-overlay

not-affected

windows only
vivid/ubuntu-core

not-affected

windows only
wily

not-affected

windows only

Показывать по

РелизСтатусПримечание
devel

not-affected

windows only
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [windows only]]
precise

DNE

trusty

not-affected

windows only
trusty/esm

DNE

trusty was not-affected [windows only]
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

EPSS

Процентиль: 36%
0.00154
Низкий

7.2 High

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
больше 9 лет назад

Untrusted search path vulnerability in Go before 1.5.4 and 1.6.x before 1.6.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, related to use of the LoadLibrary function.

CVSS3: 7.8
debian
больше 9 лет назад

Untrusted search path vulnerability in Go before 1.5.4 and 1.6.x befor ...

CVSS3: 7.8
github
больше 3 лет назад

Untrusted search path vulnerability in Go before 1.5.4 and 1.6.x before 1.6.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, related to use of the LoadLibrary function.

EPSS

Процентиль: 36%
0.00154
Низкий

7.2 High

CVSS2

7.8 High

CVSS3