Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r884-j2c4-8c9q

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.

xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.

EPSS

Процентиль: 85%
0.02388
Низкий

Связанные уязвимости

ubuntu
почти 21 год назад

xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.

redhat
почти 21 год назад

xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.

nvd
почти 21 год назад

xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.

debian
почти 21 год назад

xloadimage before 4.1-r2, and xli before 1.17, allows attackers to exe ...

fstec
почти 25 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 85%
0.02388
Низкий