Описание
debdiff.pl in devscripts 2.10.x before 2.10.69 and 2.11.x before 2.11.4 allows remote attackers to obtain system information and execute arbitrary code via the file name in a (1) .dsc or (2) .changes file.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.0:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.1:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.3:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.6:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.7:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.8:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.9:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.10:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.11:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.12:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.13:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.14:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.15:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.16:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.17:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18.1:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.19:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.20:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.21:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.22:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.23:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.24:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.25:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.26:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.27:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.28:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.29:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.30:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.31:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.32:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.33:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.34:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.35:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.36:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.38:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.39:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.40:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.41:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.42:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.43:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.44:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.45:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.46:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.47:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.48:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.49:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.50:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.51:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.52:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.53:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.54:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.55:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.56:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.57:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.58:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.59:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.60:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.61:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.62:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.63:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.64:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.65.1:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.66:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.67:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.68:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:a:devscripts_devel_team:devscripts:2.11.0:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.11.1:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.11.2:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.11.3:*:*:*:*:*:*:*
EPSS
Процентиль: 89%
0.04506
Низкий
9.3 Critical
CVSS2
Дефекты
CWE-20
Связанные уязвимости
ubuntu
больше 13 лет назад
debdiff.pl in devscripts 2.10.x before 2.10.69 and 2.11.x before 2.11.4 allows remote attackers to obtain system information and execute arbitrary code via the file name in a (1) .dsc or (2) .changes file.
debian
больше 13 лет назад
debdiff.pl in devscripts 2.10.x before 2.10.69 and 2.11.x before 2.11. ...
github
почти 4 года назад
debdiff.pl in devscripts 2.10.x before 2.10.69 and 2.11.x before 2.11.4 allows remote attackers to obtain system information and execute arbitrary code via the file name in a (1) .dsc or (2) .changes file.
EPSS
Процентиль: 89%
0.04506
Низкий
9.3 Critical
CVSS2
Дефекты
CWE-20