Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-17664

Опубликовано: 16 окт. 2019
Источник: debian
EPSS Низкий

Описание

NSA Ghidra through 9.0.4 uses a potentially untrusted search path. When executing Ghidra from a given path, the Java process working directory is set to this path. Then, when launching the Python interpreter via the "Ghidra Codebrowser > Window > Python" option, Ghidra will try to execute the cmd.exe program from this working directory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ghidraitppackage

EPSS

Процентиль: 37%
0.00156
Низкий

Связанные уязвимости

CVSS3: 7.8
nvd
больше 6 лет назад

NSA Ghidra through 9.0.4 uses a potentially untrusted search path. When executing Ghidra from a given path, the Java process working directory is set to this path. Then, when launching the Python interpreter via the "Ghidra Codebrowser > Window > Python" option, Ghidra will try to execute the cmd.exe program from this working directory.

CVSS3: 7.8
github
больше 3 лет назад

NSA Ghidra through 9.0.4 uses a potentially untrusted search path. When executing Ghidra from a given path, the Java process working directory is set to this path. Then, when launching the Python interpreter via the "Ghidra Codebrowser > Window > Python" option, Ghidra will try to execute the cmd.exe program from this working directory.

EPSS

Процентиль: 37%
0.00156
Низкий