Логотип exploitDog
bind:CVE-2019-13623
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-13623

Количество 4

Количество 4

ubuntu логотип

CVE-2019-13623

больше 6 лет назад

In NSA Ghidra before 9.1, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis result is archived for sharing with other persons. To achieve arbitrary code execution, one approach is to overwrite some critical Ghidra modules, e.g., the decompile module.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2019-13623

больше 6 лет назад

In NSA Ghidra before 9.1, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis result is archived for sharing with other persons. To achieve arbitrary code execution, one approach is to overwrite some critical Ghidra modules, e.g., the decompile module.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2019-13623

больше 6 лет назад

In NSA Ghidra before 9.1, path traversal can occur in RestoreTask.java ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-rj42-87j6-hq79

больше 3 лет назад

In NSA Ghidra through 9.0.4, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis result is archived for sharing with other persons. To achieve arbitrary code execution, one approach is to overwrite some critical Ghidra modules, e.g., the decompile module.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-13623

In NSA Ghidra before 9.1, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis result is archived for sharing with other persons. To achieve arbitrary code execution, one approach is to overwrite some critical Ghidra modules, e.g., the decompile module.

CVSS3: 7.8
4%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-13623

In NSA Ghidra before 9.1, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis result is archived for sharing with other persons. To achieve arbitrary code execution, one approach is to overwrite some critical Ghidra modules, e.g., the decompile module.

CVSS3: 7.8
4%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-13623

In NSA Ghidra before 9.1, path traversal can occur in RestoreTask.java ...

CVSS3: 7.8
4%
Низкий
больше 6 лет назад
github логотип
GHSA-rj42-87j6-hq79

In NSA Ghidra through 9.0.4, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis result is archived for sharing with other persons. To achieve arbitrary code execution, one approach is to overwrite some critical Ghidra modules, e.g., the decompile module.

CVSS3: 7.8
4%
Низкий
больше 3 лет назад

Уязвимостей на страницу