Логотип exploitDog
bind:"CVE-2019-13638"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-13638"

Количество 9

Количество 9

ubuntu логотип

CVE-2019-13638

около 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2019-13638

около 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2019-13638

около 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2019-13638

почти 5 лет назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2019-13638

около 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection th ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-vqpq-8jvg-rwmx

больше 3 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2019-03232

около 6 лет назад

Уязвимость функции do_ed_script (src/pch.c) программной Unix-утилиты GNU Patch, связанная с непринятием мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю получить доступ к конфиденциальной информации и выполнить произвольную команду

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2019-2964

почти 6 лет назад

ELSA-2019-2964: patch security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-2798

почти 6 лет назад

ELSA-2019-2798: patch security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
3%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
3%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
3%
Низкий
около 6 лет назад
msrc логотип
CVSS3: 7.8
3%
Низкий
почти 5 лет назад
debian логотип
CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection th ...

CVSS3: 7.8
3%
Низкий
около 6 лет назад
github логотип
GHSA-vqpq-8jvg-rwmx

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
3%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-03232

Уязвимость функции do_ed_script (src/pch.c) программной Unix-утилиты GNU Patch, связанная с непринятием мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю получить доступ к конфиденциальной информации и выполнить произвольную команду

CVSS3: 7.8
3%
Низкий
около 6 лет назад
oracle-oval логотип
ELSA-2019-2964

ELSA-2019-2964: patch security update (IMPORTANT)

почти 6 лет назад
oracle-oval логотип
ELSA-2019-2798

ELSA-2019-2798: patch security update (IMPORTANT)

почти 6 лет назад

Уязвимостей на страницу