Логотип exploitDog
bind:CVE-2024-39835
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-39835

Количество 4

Количество 4

ubuntu логотип

CVE-2024-39835

7 месяцев назад

A code injection vulnerability has been identified in the Robot Operating System (ROS) 'roslaunch' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2024-39835

7 месяцев назад

A code injection vulnerability has been identified in the Robot Operating System (ROS) 'roslaunch' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2024-39835

7 месяцев назад

A code injection vulnerability has been identified in the Robot Operat ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-627q-xcr8-8qpc

7 месяцев назад

A code injection vulnerability has been identified in the Robot Operating System (ROS) 'roslaunch' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-39835

A code injection vulnerability has been identified in the Robot Operating System (ROS) 'roslaunch' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code.

CVSS3: 7.8
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2024-39835

A code injection vulnerability has been identified in the Robot Operating System (ROS) 'roslaunch' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code.

CVSS3: 7.8
0%
Низкий
7 месяцев назад
debian логотип
CVE-2024-39835

A code injection vulnerability has been identified in the Robot Operat ...

CVSS3: 7.8
0%
Низкий
7 месяцев назад
github логотип
GHSA-627q-xcr8-8qpc

A code injection vulnerability has been identified in the Robot Operating System (ROS) 'roslaunch' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code.

CVSS3: 7.8
0%
Низкий
7 месяцев назад

Уязвимостей на страницу