CVE-2010-2945
30.08.2010, 20:00
The default configuration of SLiM before 1.3.2 places ./ (dot slash) at the beginning of the default_path option, which might allow local users to gain privileges via a Trojan horse program in the current working directory, related to slim.conf and cfg.cpp.Enginsight
| Vendor | Product | Version |
|---|---|---|
| simone_rota | slim_simple_login_manager | 𝑥 ≤ 1.3.1 |
| simone_rota | slim_simple_login_manager | 1.0.0 |
| simone_rota | slim_simple_login_manager | 1.1.0 |
| simone_rota | slim_simple_login_manager | 1.2.0 |
| simone_rota | slim_simple_login_manager | 1.2.1 |
| simone_rota | slim_simple_login_manager | 1.2.2 |
| simone_rota | slim_simple_login_manager | 1.2.3 |
| simone_rota | slim_simple_login_manager | 1.2.4 |
| simone_rota | slim_simple_login_manager | 1.2.5 |
| simone_rota | slim_simple_login_manager | 1.2.6 |
| simone_rota | slim_simple_login_manager | 1.3.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References