7.5
CVE-2008-0932
- EPSS 1.88%
- Veröffentlicht 25.02.2008 21:44:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
diatheke.pl in The SWORD Project Diatheke 1.5.9 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the range parameter.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
The Sword Project ≫ Diatheke Front End Version <= 1.5.9
Debian ≫ Debian Linux Version3.1
Debian ≫ Debian Linux Version3.1 Editionalpha
Debian ≫ Debian Linux Version3.1 Editionamd64
Debian ≫ Debian Linux Version3.1 Editionarm
Debian ≫ Debian Linux Version3.1 Editionhppa
Debian ≫ Debian Linux Version3.1 Editionia-32
Debian ≫ Debian Linux Version3.1 Editionia-64
Debian ≫ Debian Linux Version3.1 Editionm68k
Debian ≫ Debian Linux Version3.1 Editionmips
Debian ≫ Debian Linux Version3.1 Editionmipsel
Debian ≫ Debian Linux Version3.1 Editionppc
Debian ≫ Debian Linux Version3.1 Editions-390
Debian ≫ Debian Linux Version3.1 Editionsparc
Debian ≫ Debian Linux Version3.1 Updater1
Debian ≫ Debian Linux Version4.0
Debian ≫ Debian Linux Version4.0 Editionalpha
Debian ≫ Debian Linux Version4.0 Editionamd64
Debian ≫ Debian Linux Version4.0 Editionarm
Debian ≫ Debian Linux Version4.0 Editionhppa
Debian ≫ Debian Linux Version4.0 Editionia-32
Debian ≫ Debian Linux Version4.0 Editionia-64
Debian ≫ Debian Linux Version4.0 Editionm68k
Debian ≫ Debian Linux Version4.0 Editionmips
Debian ≫ Debian Linux Version4.0 Editionmipsel
Debian ≫ Debian Linux Version4.0 Editionpowerpc
Debian ≫ Debian Linux Version4.0 Editions-390
Debian ≫ Debian Linux Version4.0 Editionsparc
Redhat ≫ Fedora Version7
Redhat ≫ Fedora Version8
Debian ≫ Debian Linux Version3.1 Editionalpha
Debian ≫ Debian Linux Version3.1 Editionamd64
Debian ≫ Debian Linux Version3.1 Editionarm
Debian ≫ Debian Linux Version3.1 Editionhppa
Debian ≫ Debian Linux Version3.1 Editionia-32
Debian ≫ Debian Linux Version3.1 Editionia-64
Debian ≫ Debian Linux Version3.1 Editionm68k
Debian ≫ Debian Linux Version3.1 Editionmips
Debian ≫ Debian Linux Version3.1 Editionmipsel
Debian ≫ Debian Linux Version3.1 Editionppc
Debian ≫ Debian Linux Version3.1 Editions-390
Debian ≫ Debian Linux Version3.1 Editionsparc
Debian ≫ Debian Linux Version3.1 Updater1
Debian ≫ Debian Linux Version4.0
Debian ≫ Debian Linux Version4.0 Editionalpha
Debian ≫ Debian Linux Version4.0 Editionamd64
Debian ≫ Debian Linux Version4.0 Editionarm
Debian ≫ Debian Linux Version4.0 Editionhppa
Debian ≫ Debian Linux Version4.0 Editionia-32
Debian ≫ Debian Linux Version4.0 Editionia-64
Debian ≫ Debian Linux Version4.0 Editionm68k
Debian ≫ Debian Linux Version4.0 Editionmips
Debian ≫ Debian Linux Version4.0 Editionmipsel
Debian ≫ Debian Linux Version4.0 Editionpowerpc
Debian ≫ Debian Linux Version4.0 Editions-390
Debian ≫ Debian Linux Version4.0 Editionsparc
Redhat ≫ Fedora Version7
Redhat ≫ Fedora Version8
The Sword Project ≫ Sword Version <= 1.5.9
Debian ≫ Debian Linux Version3.1
Debian ≫ Debian Linux Version3.1 Editionalpha
Debian ≫ Debian Linux Version3.1 Editionamd64
Debian ≫ Debian Linux Version3.1 Editionarm
Debian ≫ Debian Linux Version3.1 Editionhppa
Debian ≫ Debian Linux Version3.1 Editionia-32
Debian ≫ Debian Linux Version3.1 Editionia-64
Debian ≫ Debian Linux Version3.1 Editionm68k
Debian ≫ Debian Linux Version3.1 Editionmips
Debian ≫ Debian Linux Version3.1 Editionmipsel
Debian ≫ Debian Linux Version3.1 Editionppc
Debian ≫ Debian Linux Version3.1 Editions-390
Debian ≫ Debian Linux Version3.1 Editionsparc
Debian ≫ Debian Linux Version3.1 Updater1
Debian ≫ Debian Linux Version4.0
Debian ≫ Debian Linux Version4.0 Editionalpha
Debian ≫ Debian Linux Version4.0 Editionamd64
Debian ≫ Debian Linux Version4.0 Editionarm
Debian ≫ Debian Linux Version4.0 Editionhppa
Debian ≫ Debian Linux Version4.0 Editionia-32
Debian ≫ Debian Linux Version4.0 Editionia-64
Debian ≫ Debian Linux Version4.0 Editionm68k
Debian ≫ Debian Linux Version4.0 Editionmips
Debian ≫ Debian Linux Version4.0 Editionmipsel
Debian ≫ Debian Linux Version4.0 Editionpowerpc
Debian ≫ Debian Linux Version4.0 Editions-390
Debian ≫ Debian Linux Version4.0 Editionsparc
Redhat ≫ Fedora Version7
Redhat ≫ Fedora Version8
Debian ≫ Debian Linux Version3.1 Editionalpha
Debian ≫ Debian Linux Version3.1 Editionamd64
Debian ≫ Debian Linux Version3.1 Editionarm
Debian ≫ Debian Linux Version3.1 Editionhppa
Debian ≫ Debian Linux Version3.1 Editionia-32
Debian ≫ Debian Linux Version3.1 Editionia-64
Debian ≫ Debian Linux Version3.1 Editionm68k
Debian ≫ Debian Linux Version3.1 Editionmips
Debian ≫ Debian Linux Version3.1 Editionmipsel
Debian ≫ Debian Linux Version3.1 Editionppc
Debian ≫ Debian Linux Version3.1 Editions-390
Debian ≫ Debian Linux Version3.1 Editionsparc
Debian ≫ Debian Linux Version3.1 Updater1
Debian ≫ Debian Linux Version4.0
Debian ≫ Debian Linux Version4.0 Editionalpha
Debian ≫ Debian Linux Version4.0 Editionamd64
Debian ≫ Debian Linux Version4.0 Editionarm
Debian ≫ Debian Linux Version4.0 Editionhppa
Debian ≫ Debian Linux Version4.0 Editionia-32
Debian ≫ Debian Linux Version4.0 Editionia-64
Debian ≫ Debian Linux Version4.0 Editionm68k
Debian ≫ Debian Linux Version4.0 Editionmips
Debian ≫ Debian Linux Version4.0 Editionmipsel
Debian ≫ Debian Linux Version4.0 Editionpowerpc
Debian ≫ Debian Linux Version4.0 Editions-390
Debian ≫ Debian Linux Version4.0 Editionsparc
Redhat ≫ Fedora Version7
Redhat ≫ Fedora Version8
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.88% | 0.828 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.