Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-6610

Опубликовано: 03 янв. 2008
Источник: debian
EPSS Низкий

Описание

unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
unpfixed1.0.13package
unpno-dsaetchpackage

EPSS

Процентиль: 75%
0.00928
Низкий

Связанные уязвимости

ubuntu
почти 18 лет назад

unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product.

nvd
почти 18 лет назад

unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product.

github
больше 3 лет назад

unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product.

EPSS

Процентиль: 75%
0.00928
Низкий