Show plain JSON{"id": "CVE-2008-5986", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.9, "accessVector": "LOCAL", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "MEDIUM", "obtainAllPrivilege": true, "exploitabilityScore": 3.4, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2009-01-28T11:30:00.217", "references": [{"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504359", "source": "cve@mitre.org"}, {"url": "http://www.openwall.com/lists/oss-security/2009/01/26/2", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/33446", "source": "cve@mitre.org"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=481550", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48276", "source": "cve@mitre.org"}, {"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504359", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2009/01/26/2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/33446", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=481550", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48276", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Untrusted search path vulnerability in the (1) \"VST plugin with Python scripting\" and (2) \"VST plugin for writing score generators in Python\" in Csound 5.08.2, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983)."}, {"lang": "es", "value": "Vulnerabilidad de ruta de b\u00fasqueda no confiable en (1) \"Extensi\u00f3n VST con secuencias de comandos Python\" y (2) \"Extensi\u00f3n VST para escribir generadores de puntuaciones en Python\" en Csound v5.08.2 y puede que otras versiones; permite a usuarios locales ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un fichero Python con un caballo de troya en el directorio de trabajo actual. Est\u00e1 relacionado con la vulnerabilidad en la funci\u00f3n PySys_SetArgv (CVE-2008-5983)."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:csound:csound:5.08.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD401A94-40BB-45A8-A702-DE8710FD0A71"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}