Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-38346

EPSS 0.94% · P76
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-38346

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in Wind River VxWorks 6.9 and 7. The function ``tarExtract`` implements TAR file extraction and thereby also processes files within an archive that have relative or absolute file paths. A developer using the "tarExtract" function may expect that the function will strip leading slashes from absolute paths or stop processing when encountering relative paths that are outside of the extraction path, unless otherwise forced. This could lead to unexpected and undocumented behavior, which in general could result in a directory traversal, and associated unexpected behavior.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Wind River VxWorks 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Wind River VxWorks是美国风河系统(Wind River)公司的一个操作系统。用于构建嵌入式设备和系统的业界领先的实时操作系统。 Wind River VxWorks 存在安全漏洞,该漏洞源于 tarExtract 函数存在缺陷可能会导致意外和未记录的行为。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2023-38346

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-38346

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-09-22 · 23 CVEs total

CVE-2022-38748.0 HIGHOs command injection via ct_command and fcct_command
CVE-2023-437715.5 MEDIUMNQPTP 资源管理错误漏洞
CVE-2023-43761WithSecure products 安全漏洞
CVE-2023-43338Cesanta MJS 缓冲区错误漏洞
CVE-2023-43468Online Job Portal SQL注入漏洞
CVE-2023-43469Online Job Portal SQL注入漏洞
CVE-2023-43470Online Voting System SQL注入漏洞
CVE-2023-43129D-LINK DIR-806 操作系统命令注入漏洞
CVE-2023-43130D-LINK DIR-806 操作系统命令注入漏洞
CVE-2023-40989JeecgBoot SQL注入漏洞
CVE-2023-43270dst-admin 代码注入漏洞
CVE-2023-43144Projectworldsl Assets-management-system-in-php SQL注入漏洞
CVE-2023-43760WithSecure products 安全漏洞
CVE-2023-43762WithSecure products 安全漏洞
CVE-2023-43763WithSecure products 跨站脚本漏洞
CVE-2023-43765WithSecure products 安全漏洞
CVE-2023-43766WithSecure products 安全漏洞
CVE-2023-43767WithSecure products 安全漏洞
CVE-2023-43770Roundcube Webmail 跨站脚本漏洞
CVE-2023-43782Cadence Design Systems GUI 安全漏洞

Showing top 20 of 23 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-38346

No comments yet


Leave a comment