5.1
CVSSv2

CVE-2010-2246

Published: 26/05/2011 Updated: 27/02/2020
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 515
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

feh prior to 1.8, when the --wget-timestamp option is enabled, might allow remote malicious users to execute arbitrary commands via shell metacharacters in a URL.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

feh project feh 1.2.6

feh project feh 1.2.5

feh project feh 1.2.3

feh project feh 1.2.1

feh project feh 1.6

feh project feh 1.4.3

feh project feh 1.3.1

feh project feh 1.2.7

feh project feh 1.2.0

feh project feh 0.9.9

feh project feh 1.4.1

feh project feh 1.4

feh project feh 1.3.5

feh project feh

feh project feh 0.6.4

feh project feh 0.5.0

feh project feh 1.6.1

feh project feh 1.5

feh project feh 1.4.2

feh project feh 1.3.3

feh project feh 1.3.0

feh project feh 1.1.0

feh project feh 0.7.0

Exploits

source: wwwsecurityfocuscom/bid/41161/info feh is prone to a remote code-execution vulnerability Attackers can exploit this issue to execute arbitrary code in the context of the user running the application Successful exploits will compromise the application and possibly the computer feh --wget-timestamp 'wwwexamplecom/stuf ...