Логотип exploitDog
bind:CVE-2013-4482
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-4482

Количество 3

Количество 3

redhat логотип

CVE-2013-4482

около 12 лет назад

Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.

CVSS2: 3.7
EPSS: Низкий
nvd логотип

CVE-2013-4482

около 12 лет назад

Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.

CVSS2: 6.2
EPSS: Низкий
github логотип

GHSA-f585-5p5j-mvf8

больше 3 лет назад

Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2013-4482

Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.

CVSS2: 3.7
0%
Низкий
около 12 лет назад
nvd логотип
CVE-2013-4482

Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.

CVSS2: 6.2
0%
Низкий
около 12 лет назад
github логотип
GHSA-f585-5p5j-mvf8

Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу