Input validation error in catfish - CVE-2014-2094
Published: February 26, 2014 / Updated: August 10, 2020
catfish
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Untrusted search path vulnerability in Catfish through 0.4.0.3, when a Fedora package such as 0.4.0.2-2 is not used, allows local users to gain privileges via a Trojan horse catfish.pyc in the current working directory.