Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-44892 | Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D". |
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 30 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Metrics |
cvssV3_1
|
ssvc
|
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2024-10-30T13:59:43.967Z
Reserved: 2022-09-28T17:00:06.607Z
Link: CVE-2022-41716
Updated: 2024-08-03T12:49:43.904Z
Status : Modified
Published: 2022-11-02T16:15:11.150
Modified: 2024-11-21T07:23:43.507
Link: CVE-2022-41716
No data.
OpenCVE Enrichment
No data.
EUVD