CVE-2005-0130
https://notcve.org/view.php?id=CVE-2005-0130
Certain Perl scripts in Konversation 0.15 allow remote attackers to execute arbitrary commands via shell metacharacters in (1) channel names or (2) song names that are not properly quoted when the user runs IRC scripts. Ciertos scripts Perl en Konversation 0.15 permiten a atacantes remotos ejecutar comandos mediante metacaractéres de shell en (1) nombres de canal o (2) nombres de canciones que no son entrecomillados adecuadamente cuando el usuario ejecuta scripts IRC. • http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/031033.html http://marc.info/?l=bugtraq&m=110626383310742&w=2 http://secunia.com/advisories/13919 http://secunia.com/advisories/13989 http://securitytracker.com/id?1012972 http://www.gentoo.org/security/en/glsa/glsa-200501-34.xml http://www.kde.org/info/security/advisory-20050121-1.txt http://www.securityfocus.com/bid/12312 https://exchange.xforce.ibmcloud.com/vulnerabilities/19008 •
CVE-2004-1388 – Berlios GPSD 2.7 - Remote Format String
https://notcve.org/view.php?id=CVE-2004-1388
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls. • https://www.exploit-db.com/exploits/3099 https://www.exploit-db.com/exploits/775 https://www.exploit-db.com/exploits/16853 https://www.exploit-db.com/exploits/10029 http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html http://marc.info/?l=bugtraq&m=110677341711505&w=2 http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html https://exchange.xforce.ibmcloud.com/vulnerabilities/19079 •