Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3gm4-7p8j-w2h8

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

EPSS

Процентиль: 70%
0.00649
Низкий

Дефекты

CWE-78

Связанные уязвимости

ubuntu
больше 14 лет назад

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

redhat
больше 14 лет назад

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

nvd
больше 14 лет назад

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

debian
больше 14 лет назад

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 ...

oracle-oval
больше 14 лет назад

ELSA-2010-0892: openswan security update (MODERATE)

EPSS

Процентиль: 70%
0.00649
Низкий

Дефекты

CWE-78