Логотип exploitDog
bind:"CVE-2019-13638" OR bind:"CVE-2018-20969"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-13638" OR bind:"CVE-2018-20969"

Количество 15

Количество 15

oracle-oval логотип

ELSA-2019-2964

почти 6 лет назад

ELSA-2019-2964: patch security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-2798

почти 6 лет назад

ELSA-2019-2798: patch security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2018-20969

около 6 лет назад

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2018-20969

около 6 лет назад

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2018-20969

около 6 лет назад

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2018-20969

около 5 лет назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2018-20969

около 6 лет назад

do_ed_script in pch.c in GNU patch through 2.7.6 does not block string ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2019-13638

около 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2019-13638

около 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2019-13638

около 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2019-13638

почти 5 лет назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2019-13638

около 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection th ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-g5pm-269j-95rr

больше 3 лет назад

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-vqpq-8jvg-rwmx

больше 3 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2019-03232

около 6 лет назад

Уязвимость функции do_ed_script (src/pch.c) программной Unix-утилиты GNU Patch, связанная с непринятием мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю получить доступ к конфиденциальной информации и выполнить произвольную команду

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2019-2964

ELSA-2019-2964: patch security update (IMPORTANT)

почти 6 лет назад
oracle-oval логотип
ELSA-2019-2798

ELSA-2019-2798: patch security update (IMPORTANT)

почти 6 лет назад
ubuntu логотип
CVE-2018-20969

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

CVSS3: 7.8
1%
Низкий
около 6 лет назад
redhat логотип
CVE-2018-20969

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

CVSS3: 7.8
1%
Низкий
около 6 лет назад
nvd логотип
CVE-2018-20969

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

CVSS3: 7.8
1%
Низкий
около 6 лет назад
msrc логотип
CVSS3: 7.8
1%
Низкий
около 5 лет назад
debian логотип
CVE-2018-20969

do_ed_script in pch.c in GNU patch through 2.7.6 does not block string ...

CVSS3: 7.8
1%
Низкий
около 6 лет назад
ubuntu логотип
CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
3%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
3%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
3%
Низкий
около 6 лет назад
msrc логотип
CVSS3: 7.8
3%
Низкий
почти 5 лет назад
debian логотип
CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection th ...

CVSS3: 7.8
3%
Низкий
около 6 лет назад
github логотип
GHSA-g5pm-269j-95rr

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

CVSS3: 7.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-vqpq-8jvg-rwmx

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
3%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-03232

Уязвимость функции do_ed_script (src/pch.c) программной Unix-утилиты GNU Patch, связанная с непринятием мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю получить доступ к конфиденциальной информации и выполнить произвольную команду

CVSS3: 7.8
3%
Низкий
около 6 лет назад

Уязвимостей на страницу