CVE-2005-4533

Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via "getopt" style argument specifications, which are not filtered.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:scponly:scponly:2.0:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:2.1:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:3.0:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:3.5:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:3.8:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:3.9:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:3.11:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:4.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2005-12-28 01:03

Updated : 2024-02-04 16:52


NVD link : CVE-2005-4533

Mitre link : CVE-2005-4533

CVE.ORG link : CVE-2005-4533


JSON object : View

Products Affected

scponly

  • scponly