Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r884-j2c4-8c9q

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.

xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.

EPSS

Процентиль: 84%
0.02388
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.

redhat
больше 20 лет назад

xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.

nvd
больше 20 лет назад

xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.

debian
больше 20 лет назад

xloadimage before 4.1-r2, and xli before 1.17, allows attackers to exe ...

fstec
больше 24 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 84%
0.02388
Низкий