CVE-2010-2945

The default configuration of SLiM before 1.3.2 places ./ (dot slash) at the beginning of the default_path option, which might allow local users to gain privileges via a Trojan horse program in the current working directory, related to slim.conf and cfg.cpp.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.9 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 13%
VendorProductVersion
simone_rotaslim_simple_login_manager
𝑥
≤ 1.3.1
simone_rotaslim_simple_login_manager
1.0.0
simone_rotaslim_simple_login_manager
1.1.0
simone_rotaslim_simple_login_manager
1.2.0
simone_rotaslim_simple_login_manager
1.2.1
simone_rotaslim_simple_login_manager
1.2.2
simone_rotaslim_simple_login_manager
1.2.3
simone_rotaslim_simple_login_manager
1.2.4
simone_rotaslim_simple_login_manager
1.2.5
simone_rotaslim_simple_login_manager
1.2.6
simone_rotaslim_simple_login_manager
1.3.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
slim
bullseye
1.3.6-5.2
fixed
bookworm
1.3.6-5.3
fixed
sid
1.3.6-5.4
fixed
trixie
1.3.6-5.4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
slim
saucy
not-affected
raring
not-affected
quantal
not-affected
precise
not-affected
oneiric
not-affected
natty
not-affected
maverick
not-affected
lucid
ignored
karmic
dne
jaunty
ignored
hardy
ignored
dapper
dne
Common Weakness Enumeration