Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-3753

Опубликовано: 05 окт. 2010
Источник: debian
EPSS Низкий

Описание

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openswanfixed1:2.6.28+dfsg-2package
openswannot-affectedlennypackage

EPSS

Процентиль: 70%
0.00649
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

redhat
больше 14 лет назад

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

nvd
больше 14 лет назад

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

github
около 3 лет назад

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

oracle-oval
больше 14 лет назад

ELSA-2010-0892: openswan security update (MODERATE)

EPSS

Процентиль: 70%
0.00649
Низкий