Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-5534

Опубликовано: 03 дек. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."

РелизСтатусПримечание
devel

not-affected

0.3.9.2-1
esm-apps/xenial

not-affected

0.3.9.2-1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [0.3.9.2-1]]
hardy

ignored

end of life
lucid

ignored

end of life
oneiric

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

not-affected

0.3.9.2-1

Показывать по

EPSS

Процентиль: 83%
0.01972
Низкий

7.5 High

CVSS2

Связанные уязвимости

nvd
около 13 лет назад

The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."

debian
около 13 лет назад

The hook_process function in the plugin API for WeeChat 0.3.0 through ...

github
больше 3 лет назад

The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."

EPSS

Процентиль: 83%
0.01972
Низкий

7.5 High

CVSS2