RSS   Podatności dla 'Catfish'   RSS

2014-02-26
 
CVE-2014-2096

CWE-264
 

 
Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0 allows local users to gain privileges via a Trojan horse bin/catfish.py under the current working directory.

 
 
CVE-2014-2095

CWE-264
 

 
Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0, when a Fedora package such as 0.8.2-1 is not used, allows local users to gain privileges via a Trojan horse bin/catfish.pyc under the current working directory.

 
 
CVE-2014-2094

CWE-264
 

 
Untrusted search path vulnerability in Catfish through 0.4.0.3, when a Fedora package such as 0.4.0.2-2 is not used, allows local users to gain privileges via a Trojan horse catfish.pyc in the current working directory.

 
 
CVE-2014-2093

CWE-264
 

 
Untrusted search path vulnerability in Catfish through 0.4.0.3 allows local users to gain privileges via a Trojan horse catfish.py in the current working directory.

 


Copyright 2024, cxsecurity.com

 

Back to Top