Описание
The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.3.9.2-1 |
| esm-apps/xenial | not-affected | 0.3.9.2-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [0.3.9.2-1]] |
| hardy | ignored | end of life |
| lucid | ignored | end of life |
| oneiric | ignored | end of life |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| quantal | ignored | end of life |
| raring | not-affected | 0.3.9.2-1 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."
The hook_process function in the plugin API for WeeChat 0.3.0 through ...
The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."
EPSS
7.5 High
CVSS2