Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6gj2-w23f-chf3

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

rpmbuild in RPM 4.8.0 and earlier does not properly parse the syntax of spec files, which allows user-assisted remote attackers to remove home directories via vectors involving a ;~ (semicolon tilde) sequence in a Name tag.

rpmbuild in RPM 4.8.0 and earlier does not properly parse the syntax of spec files, which allows user-assisted remote attackers to remove home directories via vectors involving a ;~ (semicolon tilde) sequence in a Name tag.

EPSS

Процентиль: 62%
0.0043
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

rpmbuild in RPM 4.8.0 and earlier does not properly parse the syntax of spec files, which allows user-assisted remote attackers to remove home directories via vectors involving a ;~ (semicolon tilde) sequence in a Name tag.

redhat
больше 15 лет назад

rpmbuild in RPM 4.8.0 and earlier does not properly parse the syntax of spec files, which allows user-assisted remote attackers to remove home directories via vectors involving a ;~ (semicolon tilde) sequence in a Name tag.

nvd
больше 15 лет назад

rpmbuild in RPM 4.8.0 and earlier does not properly parse the syntax of spec files, which allows user-assisted remote attackers to remove home directories via vectors involving a ;~ (semicolon tilde) sequence in a Name tag.

debian
больше 15 лет назад

rpmbuild in RPM 4.8.0 and earlier does not properly parse the syntax o ...

fstec
больше 13 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 62%
0.0043
Низкий