Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2v37-26xm-h4rf

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

ghostscript before 5.10-16 uses an empty LD_RUN_PATH environmental variable to find libraries in the current directory, which could allow local users to execute commands as other users by placing a Trojan horse library into a directory from which another user executes ghostscript.

ghostscript before 5.10-16 uses an empty LD_RUN_PATH environmental variable to find libraries in the current directory, which could allow local users to execute commands as other users by placing a Trojan horse library into a directory from which another user executes ghostscript.

EPSS

Процентиль: 26%
0.00086
Низкий

Связанные уязвимости

nvd
больше 24 лет назад

ghostscript before 5.10-16 uses an empty LD_RUN_PATH environmental variable to find libraries in the current directory, which could allow local users to execute commands as other users by placing a Trojan horse library into a directory from which another user executes ghostscript.

EPSS

Процентиль: 26%
0.00086
Низкий