Total vulnerabilities in the database
CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."
Software | From | Fixed in |
---|---|---|
gnu / cvs | 1.12.10 | 1.12.10.x |
gnu / cvs | 1.12.7 | 1.12.7.x |
gnu / cvs | 1.12.9 | 1.12.9.x |
gnu / cvs | 1.12.11 | 1.12.11.x |
gnu / cvs | 1.12.13 | 1.12.13.x |
gnu / cvs | 1.12.6 | 1.12.6.x |
gnu / cvs | 1.12.5 | 1.12.5.x |
gnu / cvs | 1.12.3 | 1.12.3.x |
gnu / cvs | 1.12.1 | 1.12.1.x |
gnu / cvs | 1.12.12 | 1.12.12.x |
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 17.04 | 17.04.x |
debian / debian_linux | 8.0 | 8.0.x |
debian / debian_linux | 9.0 | 9.0.x |