Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-767p-jcph-vjj3

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Joe text editor 2.8 searches the current working directory (CWD) for the .joerc configuration file, which could allow local users to gain privileges of other users by placing a Trojan Horse .joerc file into a directory, then waiting for users to execute joe from that directory.

Joe text editor 2.8 searches the current working directory (CWD) for the .joerc configuration file, which could allow local users to gain privileges of other users by placing a Trojan Horse .joerc file into a directory, then waiting for users to execute joe from that directory.

EPSS

Процентиль: 48%
0.00246
Низкий

Связанные уязвимости

redhat
больше 24 лет назад

Joe text editor 2.8 searches the current working directory (CWD) for the .joerc configuration file, which could allow local users to gain privileges of other users by placing a Trojan Horse .joerc file into a directory, then waiting for users to execute joe from that directory.

nvd
больше 24 лет назад

Joe text editor 2.8 searches the current working directory (CWD) for the .joerc configuration file, which could allow local users to gain privileges of other users by placing a Trojan Horse .joerc file into a directory, then waiting for users to execute joe from that directory.

EPSS

Процентиль: 48%
0.00246
Низкий