Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-0552

Опубликовано: 15 янв. 2015
Источник: nvd
CVSS2: 6.4
EPSS Низкий

Описание

Directory traversal vulnerability in the gcab_folder_extract function in libgcab/gcab-folder.c in gcab 0.4 allows remote attackers to write to arbitrary files via crafted path in a CAB file, as demonstrated by "\tmp\moo."

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:gnome:gcab:0.4:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

EPSS

Процентиль: 72%
0.00737
Низкий

6.4 Medium

CVSS2

Дефекты

CWE-22

Связанные уязвимости

ubuntu
около 11 лет назад

Directory traversal vulnerability in the gcab_folder_extract function in libgcab/gcab-folder.c in gcab 0.4 allows remote attackers to write to arbitrary files via crafted path in a CAB file, as demonstrated by "\tmp\moo."

debian
около 11 лет назад

Directory traversal vulnerability in the gcab_folder_extract function ...

github
больше 3 лет назад

Directory traversal vulnerability in the gcab_folder_extract function in libgcab/gcab-folder.c in gcab 0.4 allows remote attackers to write to arbitrary files via crafted path in a CAB file, as demonstrated by "\tmp\moo."

EPSS

Процентиль: 72%
0.00737
Низкий

6.4 Medium

CVSS2

Дефекты

CWE-22