10
CVE-2010-0418
- EPSS 2.85%
- Veröffentlicht 10.03.2010 20:13:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
The web interface in chumby one before 1.0.4 and chumby classic before 1.7.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a request.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Chumby ≫ Chumby One Version <= 1.0.3
Chumby ≫ Chumby One Version1.0.2
Chumby ≫ Chumby Classic Version <= 1.7.1
Chumby ≫ Chumby Classic Version0.9
Chumby ≫ Chumby Classic Version1.1
Chumby ≫ Chumby Classic Version1.2
Chumby ≫ Chumby Classic Version1.4
Chumby ≫ Chumby Classic Version1.5
Chumby ≫ Chumby Classic Version1.6
Chumby ≫ Chumby Classic Version1.7
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 2.85% | 0.857 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.