{
  "modified": "2025-08-09T19:01:28Z",
  "published": "2009-01-28T11:30:00Z",
  "id": "CVE-2008-5984",
  "details": "Untrusted search path vulnerability in the Python plugin in Dia 0.96.1, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).",
  "references": [
    {
      "type": "ADVISORY",
      "url": "http://secunia.com/advisories/33672"
    },
    {
      "type": "ADVISORY",
      "url": "http://secunia.com/advisories/33703"
    },
    {
      "type": "ADVISORY",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:040"
    },
    {
      "type": "ADVISORY",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:046"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=481551"
    },
    {
      "type": "WEB",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504251"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2009/01/26/2"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/bid/33448"
    },
    {
      "type": "WEB",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48262"
    },
    {
      "type": "WEB",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01065.html"
    }
  ]
}
