Show plain JSON{"id": "CVE-2006-3633", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2006-07-27T01:04:00.000", "references": [{"url": "http://secunia.com/advisories/21209", "tags": ["Patch", "Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.014-shiela.html", "tags": ["Patch", "Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/19199", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "http://www.sourcefire.com/services/advisories/sa072506.html", "tags": ["Patch", "Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.vupen.com/english/advisories/2006/2986", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27978", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/21209", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.014-shiela.html", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/19199", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.sourcefire.com/services/advisories/sa072506.html", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2006/2986", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27978", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-20"}]}], "descriptions": [{"lang": "en", "value": "OSSP shiela 1.1.5 and earlier allows remote authenticated users to execute arbitrary commands on the CVS server via shell metacharacters in a filename that is committed."}, {"lang": "es", "value": "OSSP shiela 1.1.5 y anteriores permite a usuarios autenticados remotamente ejecutar comandos de su elecci\u00f3n en el servidor CVS mediante meta-caracteres de l\u00ednea de comandos en un nombre de archivo que es enviado (commited)."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ossp:shiela:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB25CF9F-B80B-4ED1-A412-DB9CEC9702A5", "versionEndIncluding": "1.1.5"}, {"criteria": "cpe:2.3:a:ossp:shiela:0.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E4ADD90-131F-4741-A844-3B2174BE70FF"}, {"criteria": "cpe:2.3:a:ossp:shiela:0.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E8BD603-A42B-4256-90DA-57AEB6C9E50C"}, {"criteria": "cpe:2.3:a:ossp:shiela:0.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A865B5B-747E-4291-A04B-BD7D62000971"}, {"criteria": "cpe:2.3:a:ossp:shiela:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B31C1B50-381A-4821-B392-0DA9FA61A69A"}, {"criteria": "cpe:2.3:a:ossp:shiela:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42E76393-336A-4FF7-BC73-6B580B619C76"}, {"criteria": "cpe:2.3:a:ossp:shiela:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "782A6EF6-2997-45A7-BD58-159124FA2A26"}, {"criteria": "cpe:2.3:a:ossp:shiela:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A93BF8B-61D2-4BC7-886A-1CBCDCFEA03F"}, {"criteria": "cpe:2.3:a:ossp:shiela:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83BDB983-518D-4633-AADA-3950A89D2CEC"}, {"criteria": "cpe:2.3:a:ossp:shiela:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09FBB3AE-46D7-4799-BD83-141B142F3642"}, {"criteria": "cpe:2.3:a:ossp:shiela:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CA3FC26-F2A4-4C4F-B582-680A22084DF5"}, {"criteria": "cpe:2.3:a:ossp:shiela:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDC9D8CF-3E8F-463D-963E-6BAE419B8E39"}, {"criteria": "cpe:2.3:a:ossp:shiela:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC369D29-3A18-4C10-A73B-A264383F9EB0"}, {"criteria": "cpe:2.3:a:ossp:shiela:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40268639-EB96-44F8-A76B-10998992E58F"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}