Описание
unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product.
unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-6610
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448437
- http://bugs.gentoo.org/show_bug.cgi?id=203106
- http://osvdb.org/42759
- http://secunia.com/advisories/28282
- http://secunia.com/advisories/28388
- http://security.gentoo.org/glsa/glsa-200801-01.xml
- http://www.securityfocus.com/bid/27182
EPSS
CVE ID
Связанные уязвимости
unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product.
unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product.
unp 1.0.12, and other versions before 1.0.14, does not properly escape ...
EPSS