Описание
picocom before 2.0 has a command injection vulnerability in the 'send and receive file' command because the command line is executed by /bin/sh unsafely.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.7-2 |
| esm-apps/xenial | released | 1.7-2build0.16.04.1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1.7-2build0.14.04.1]] |
| precise/esm | DNE | |
| trusty | released | 1.7-2build0.14.04.1 |
| trusty/esm | DNE | trusty was released [1.7-2build0.14.04.1] |
| upstream | released | 1.7-2 |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE | |
| xenial | released | 1.7-2build0.16.04.1 |
Показывать по
EPSS
10 Critical
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
picocom before 2.0 has a command injection vulnerability in the 'send and receive file' command because the command line is executed by /bin/sh unsafely.
picocom before 2.0 has a command injection vulnerability in the 'send ...
picocom before 2.0 has a command injection vulnerability in the 'send and receive file' command because the command line is executed by /bin/sh unsafely.
Уязвимость обработчика команды «send and receive file» микропрограммного обеспечения эмуляции терминала Picocom, позволяющая нарушителю выполнить произвольную команду
EPSS
10 Critical
CVSS2
9.8 Critical
CVSS3