feh before 1.8, when the --wget-timestamp option is enabled, might allow remote attackers to execute arbitrary commands via shell metacharacters in a URL.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://derf.homelinux.org/git/feh/plain/ChangeLog - | |
References | () http://openwall.com/lists/oss-security/2010/06/25/4 - Exploit | |
References | () http://openwall.com/lists/oss-security/2010/06/28/4 - Exploit | |
References | () http://www.securityfocus.com/bid/41161 - Exploit |
Information
Published : 2011-05-26 18:55
Updated : 2024-11-21 01:16
NVD link : CVE-2010-2246
Mitre link : CVE-2010-2246
CVE.ORG link : CVE-2010-2246
JSON object : View
Products Affected
feh_project
- feh
CWE
CWE-20
Improper Input Validation