CVE-2014-2096

EUVD-2014-2136
Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0 allows local users to gain privileges via a Trojan horse bin/catfish.py under the current working directory.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.6 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 20%
Affected Products (NVD)
VendorProductVersion
catfish_projectcatfish
0.6.0
catfish_projectcatfish
0.6.1
catfish_projectcatfish
0.6.2
catfish_projectcatfish
0.6.3
catfish_projectcatfish
0.6.4
catfish_projectcatfish
0.8.0
catfish_projectcatfish
0.8.1
catfish_projectcatfish
0.8.2
catfish_projectcatfish
1.0.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
catfish
bookworm
4.16.4-2
fixed
bullseye
4.16.0-1
fixed
sid
4.16.4-2
fixed
trixie
4.16.4-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
catfish
lucid
ignored
precise
ignored
quantal
ignored
saucy
ignored
trusty
Fixed 1.0.1-1
released
utopic
ignored
vivid
ignored
wily
ignored
xenial
not-affected
yakkety
not-affected
zesty
not-affected