Логотип exploitDog
bind:"BDU:2019-03232" OR bind:"CVE-2019-13638"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2019-03232" OR bind:"CVE-2019-13638"

Количество 9

Количество 9

fstec логотип

BDU:2019-03232

больше 6 лет назад

Уязвимость функции do_ed_script (src/pch.c) программной Unix-утилиты GNU Patch, связанная с непринятием мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю получить доступ к конфиденциальной информации и выполнить произвольную команду

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2019-13638

больше 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2019-13638

больше 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2019-13638

больше 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2019-13638

больше 5 лет назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2019-13638

больше 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection th ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-vqpq-8jvg-rwmx

больше 3 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2019-2964

больше 6 лет назад

ELSA-2019-2964: patch security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-2798

больше 6 лет назад

ELSA-2019-2798: patch security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2019-03232

Уязвимость функции do_ed_script (src/pch.c) программной Unix-утилиты GNU Patch, связанная с непринятием мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю получить доступ к конфиденциальной информации и выполнить произвольную команду

CVSS3: 7.8
2%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
2%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
2%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
2%
Низкий
больше 6 лет назад
msrc логотип
CVSS3: 7.8
2%
Низкий
больше 5 лет назад
debian логотип
CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection th ...

CVSS3: 7.8
2%
Низкий
больше 6 лет назад
github логотип
GHSA-vqpq-8jvg-rwmx

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
2%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2019-2964

ELSA-2019-2964: patch security update (IMPORTANT)

больше 6 лет назад
oracle-oval логотип
ELSA-2019-2798

ELSA-2019-2798: patch security update (IMPORTANT)

больше 6 лет назад

Уязвимостей на страницу