Total vulnerabilities in the database
Sambar Server before 6.0 beta 3 allows attackers with physical access to execute arbitrary code via a request with an MS-DOS device name such as com1.pl, con.pl, or aux.pl, which causes Perl to read the code from the associated device.
Software | From | Fixed in |
---|---|---|
sambar / sambar_server | 6.0-beta1 | 6.0-beta1.x |
sambar / sambar_server | 5.3 | 5.3.x |
sambar / sambar_server | 5.0-beta5 | 5.0-beta5.x |
sambar / sambar_server | 5.1-beta4 | 5.1-beta4.x |
sambar / sambar_server | 5.0-beta2 | 5.0-beta2.x |
sambar / sambar_server | 5.1-beta3 | 5.1-beta3.x |
sambar / sambar_server | 5.0-beta4 | 5.0-beta4.x |
sambar / sambar_server | 5.2 | 5.2.x |
sambar / sambar_server | 5.1-beta1 | 5.1-beta1.x |
sambar / sambar_server | 5.0-beta6 | 5.0-beta6.x |
sambar / sambar_server | 5.0-beta3 | 5.0-beta3.x |
sambar / sambar_server | 5.1-beta5 | 5.1-beta5.x |
sambar / sambar_server | 5.0-beta1 | 5.0-beta1.x |
sambar / sambar_server | 5.1-beta2 | 5.1-beta2.x |
sambar / sambar_server | 5.0 | 5.0.x |
sambar / sambar_server | 5.1 | 5.1.x |
sambar / sambar_server | 6.0-beta2 | 6.0-beta2.x |