Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p2xm-ffwj-w834

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

c2faxrecv in capi4hylafax 01.02.03 allows remote attackers to execute arbitrary commands via null (\0) and shell metacharacters in the TSI string, as demonstrated by a fax from an anonymous number.

c2faxrecv in capi4hylafax 01.02.03 allows remote attackers to execute arbitrary commands via null (\0) and shell metacharacters in the TSI string, as demonstrated by a fax from an anonymous number.

EPSS

Процентиль: 80%
0.01639
Низкий

Связанные уязвимости

ubuntu
около 19 лет назад

c2faxrecv in capi4hylafax 01.02.03 allows remote attackers to execute arbitrary commands via null (\0) and shell metacharacters in the TSI string, as demonstrated by a fax from an anonymous number.

nvd
около 19 лет назад

c2faxrecv in capi4hylafax 01.02.03 allows remote attackers to execute arbitrary commands via null (\0) and shell metacharacters in the TSI string, as demonstrated by a fax from an anonymous number.

debian
около 19 лет назад

c2faxrecv in capi4hylafax 01.02.03 allows remote attackers to execute ...

EPSS

Процентиль: 80%
0.01639
Низкий