The server in Bcfg2 1.1.2 and previous versions, and 1.2 prerelease, allows remote malicious users to execute arbitrary commands via shell metacharacters in data received from a client.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
bcfg2 bcfg2 0.5 |
||
bcfg2 bcfg2 0.6 |
||
bcfg2 bcfg2 0.6.9 |
||
bcfg2 bcfg2 0.6.10 |
||
bcfg2 bcfg2 0.8.1 |
||
bcfg2 bcfg2 0.8.2 |
||
bcfg2 bcfg2 0.8.7.2 |
||
bcfg2 bcfg2 0.9.0 |
||
bcfg2 bcfg2 0.9.5.3 |
||
bcfg2 bcfg2 0.9.5.5 |
||
bcfg2 bcfg2 1.0.1 |
||
bcfg2 bcfg2 1.1.0 |
||
bcfg2 bcfg2 |
||
bcfg2 bcfg2 0.6.4 |
||
bcfg2 bcfg2 0.6.5 |
||
bcfg2 bcfg2 0.6.6 |
||
bcfg2 bcfg2 0.7.2 |
||
bcfg2 bcfg2 0.7.3 |
||
bcfg2 bcfg2 0.8.5 |
||
bcfg2 bcfg2 0.8.6.1 |
||
bcfg2 bcfg2 0.9.4 |
||
bcfg2 bcfg2 0.9.5 |
||
bcfg2 bcfg2 1.0 |
||
bcfg2 bcfg2 0.3.1 |
||
bcfg2 bcfg2 0.4 |
||
bcfg2 bcfg2 0.6.7 |
||
bcfg2 bcfg2 0.6.8 |
||
bcfg2 bcfg2 0.7.4 |
||
bcfg2 bcfg2 0.8.0 |
||
bcfg2 bcfg2 0.8.7 |
||
bcfg2 bcfg2 0.8.7.1 |
||
bcfg2 bcfg2 0.9.5.1 |
||
bcfg2 bcfg2 0.9.5.2 |
||
bcfg2 bcfg2 1.0.0 |
||
bcfg2 bcfg2 0.6.1 |
||
bcfg2 bcfg2 0.6.3 |
||
bcfg2 bcfg2 0.7.0 |
||
bcfg2 bcfg2 0.7.1 |
||
bcfg2 bcfg2 0.8.3 |
||
bcfg2 bcfg2 0.8.4 |
||
bcfg2 bcfg2 0.9.1d |
||
bcfg2 bcfg2 0.9.2 |
||
bcfg2 bcfg2 0.9.3 |
||
bcfg2 bcfg2 0.9.5.7 |
||
bcfg2 bcfg2 0.9.6 |
||
bcfg2 bcfg2 1.1.1 |
||
bcfg2 bcfg2 1.2 |