4.4
CVE-2014-0039
- EPSS 0.09%
- Veröffentlicht 08.02.2014 00:55:06
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
Untrusted search path vulnerability in fwsnort before 1.6.4, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnort.conf in the current working directory.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cipherdyne ≫ Fwsnort Version <= 1.6.4
Cipherdyne ≫ Fwsnort Version0.5
Cipherdyne ≫ Fwsnort Version0.6
Cipherdyne ≫ Fwsnort Version0.6.1
Cipherdyne ≫ Fwsnort Version0.6.2
Cipherdyne ≫ Fwsnort Version0.6.3
Cipherdyne ≫ Fwsnort Version0.6.4
Cipherdyne ≫ Fwsnort Version0.6.5
Cipherdyne ≫ Fwsnort Version0.7.0
Cipherdyne ≫ Fwsnort Version0.8.0
Cipherdyne ≫ Fwsnort Version0.8.1
Cipherdyne ≫ Fwsnort Version0.8.2
Cipherdyne ≫ Fwsnort Version0.9.0
Cipherdyne ≫ Fwsnort Version1.0
Cipherdyne ≫ Fwsnort Version1.0.1
Cipherdyne ≫ Fwsnort Version1.0.2
Cipherdyne ≫ Fwsnort Version1.0.3
Cipherdyne ≫ Fwsnort Version1.0.4
Cipherdyne ≫ Fwsnort Version1.0.5
Cipherdyne ≫ Fwsnort Version1.0.6
Cipherdyne ≫ Fwsnort Version1.5
Cipherdyne ≫ Fwsnort Version1.6
Cipherdyne ≫ Fwsnort Version1.6.1
Cipherdyne ≫ Fwsnort Version1.6.2
Cipherdyne ≫ Fwsnort Version1.6.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.09% | 0.224 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.4 | 3.4 | 6.4 |
AV:L/AC:M/Au:N/C:P/I:P/A:P
|