Логотип exploitDog
bind:CVE-2010-4000
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2010-4000

Количество 4

Количество 4

ubuntu логотип

CVE-2010-4000

больше 15 лет назад

gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

CVSS2: 6.9
EPSS: Низкий
nvd логотип

CVE-2010-4000

больше 15 лет назад

gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

CVSS2: 6.9
EPSS: Низкий
debian логотип

CVE-2010-4000

больше 15 лет назад

gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name ...

CVSS2: 6.9
EPSS: Низкий
github логотип

GHSA-gm3m-g83g-8676

больше 3 лет назад

gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2010-4000

gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

CVSS2: 6.9
0%
Низкий
больше 15 лет назад
nvd логотип
CVE-2010-4000

gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

CVSS2: 6.9
0%
Низкий
больше 15 лет назад
debian логотип
CVE-2010-4000

gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name ...

CVSS2: 6.9
0%
Низкий
больше 15 лет назад
github логотип
GHSA-gm3m-g83g-8676

gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу