Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2p56-r36q-fx99

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The ispell_op function in ee on FreeBSD 4.10 to 6.0 uses predictable filenames and does not confirm which file is being written, which allows local users to overwrite arbitrary files via a symlink attack when ee invokes ispell.

The ispell_op function in ee on FreeBSD 4.10 to 6.0 uses predictable filenames and does not confirm which file is being written, which allows local users to overwrite arbitrary files via a symlink attack when ee invokes ispell.

EPSS

Процентиль: 22%
0.00072
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

The ispell_op function in ee on FreeBSD 4.10 to 6.0 uses predictable filenames and does not confirm which file is being written, which allows local users to overwrite arbitrary files via a symlink attack when ee invokes ispell.

nvd
больше 19 лет назад

The ispell_op function in ee on FreeBSD 4.10 to 6.0 uses predictable filenames and does not confirm which file is being written, which allows local users to overwrite arbitrary files via a symlink attack when ee invokes ispell.

debian
больше 19 лет назад

The ispell_op function in ee on FreeBSD 4.10 to 6.0 uses predictable f ...

EPSS

Процентиль: 22%
0.00072
Низкий