duck before 0.10 did not properly handle loading of untrusted code from the current directory.
References
Link | Resource |
---|---|
https://salsa.debian.org/debian/duck/-/commit/b43b5bbf07973c54b8f1c581a941f4facc97177a | Patch Permissions Required Vendor Advisory |
https://salsa.debian.org/debian/duck/-/commit/b43b5bbf07973c54b8f1c581a941f4facc97177a | Patch Permissions Required Vendor Advisory |
Configurations
History
21 Nov 2024, 02:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://salsa.debian.org/debian/duck/-/commit/b43b5bbf07973c54b8f1c581a941f4facc97177a - Patch, Permissions Required, Vendor Advisory |
Information
Published : 2022-02-19 17:15
Updated : 2024-11-21 02:46
NVD link : CVE-2016-1239
Mitre link : CVE-2016-1239
CVE.ORG link : CVE-2016-1239
JSON object : View
Products Affected
debian
- duck
CWE