Логотип exploitDog
bind:"GHSA-vvjp-q62m-2vph" OR bind:"CVE-2023-45283"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-vvjp-q62m-2vph" OR bind:"CVE-2023-45283"

Количество 11

Количество 11

github логотип

GHSA-vvjp-q62m-2vph

больше 1 года назад

The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2023-45283

больше 1 года назад

The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \?, resulting in filepath.Clean(\?\c:) returning \?\c: rather than \?...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-45283

больше 1 года назад

The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \?, resulting in filepath.Clean(\?\c:) returning \?\c: rather than \?\c:

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-45283

больше 1 года назад

The filepath package does not recognize paths with a \??\ prefix as sp ...

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2023-09013

больше 1 года назад

Уязвимость пакета filepath языка программирования Go, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4471-1

больше 1 года назад

Security update for go1.21

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4470-1

больше 1 года назад

Security update for go1.20

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4472-1

больше 1 года назад

Security update for go1.20-openssl

EPSS: Низкий
redos логотип

ROS-20240826-01

10 месяцев назад

Множественные уязвимости packer

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20240402-17

около 1 года назад

Множественные уязвимости golang

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4469-1

больше 1 года назад

Security update for go1.21-openssl

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-vvjp-q62m-2vph

The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2023-45283

The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \?, resulting in filepath.Clean(\?\c:) returning \?\c: rather than \?...

CVSS3: 7.5
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-45283

The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \?, resulting in filepath.Clean(\?\c:) returning \?\c: rather than \?\c:

CVSS3: 7.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-45283

The filepath package does not recognize paths with a \??\ prefix as sp ...

CVSS3: 7.5
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2023-09013

Уязвимость пакета filepath языка программирования Go, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4471-1

Security update for go1.21

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4470-1

Security update for go1.20

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4472-1

Security update for go1.20-openssl

больше 1 года назад
redos логотип
ROS-20240826-01

Множественные уязвимости packer

CVSS3: 7.5
10 месяцев назад
redos логотип
ROS-20240402-17

Множественные уязвимости golang

CVSS3: 7.5
около 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4469-1

Security update for go1.21-openssl

больше 1 года назад

Уязвимостей на страницу