Логотип exploitDog
bind:"CVE-2022-30269" OR bind:"CVE-2022-30634" OR bind:"CVE-2022-29804" OR bind:"CVE-2022-30580"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-30269" OR bind:"CVE-2022-30634" OR bind:"CVE-2022-29804" OR bind:"CVE-2022-30580"

Количество 22

Количество 22

github логотип

GHSA-4r7w-gv7f-q74g

около 3 лет назад

Incorrect conversion of certain invalid paths to valid, absolute paths in Clean in path/filepath before Go 1.17.11 and Go 1.18.3 on Windows allows potential directory traversal attack.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-2v97-2cxm-mvp4

около 3 лет назад

Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-4r7w-gv7f-q74g

Incorrect conversion of certain invalid paths to valid, absolute paths in Clean in path/filepath before Go 1.17.11 and Go 1.18.3 on Windows allows potential directory traversal attack.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-2v97-2cxm-mvp4

Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset.

CVSS3: 7.8
0%
Низкий
около 3 лет назад

Уязвимостей на страницу