CVE-2012-5534
03.12.2012, 21:55
The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."Enginsight
Vendor | Product | Version |
---|---|---|
flashtux | weechat | 0.3.0 |
flashtux | weechat | 0.3.1 |
flashtux | weechat | 0.3.1.1 |
flashtux | weechat | 0.3.2 |
flashtux | weechat | 0.3.3 |
flashtux | weechat | 0.3.4 |
flashtux | weechat | 0.3.6 |
flashtux | weechat | 0.3.7 |
flashtux | weechat | 0.3.8 |
flashtux | weechat | 0.3.9 |
flashtux | weechat | 0.3.9.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References