Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4f5h-wcj8-92w2

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks.

Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks.

EPSS

Процентиль: 50%
0.00269
Низкий

Дефекты

CWE-134

Связанные уязвимости

ubuntu
больше 18 лет назад

Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks.

redhat
больше 18 лет назад

Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks.

nvd
больше 18 лет назад

Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks.

debian
больше 18 лет назад

Untrusted search path vulnerability in the add_filename_to_string func ...

oracle-oval
почти 16 лет назад

ELSA-2009-1471: elinks security update (IMPORTANT)

EPSS

Процентиль: 50%
0.00269
Низкий

Дефекты

CWE-134