1 results (0.003 seconds)

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

The doHotCopy subroutine in socket-server.pl in Zmanda Recovery Manager (ZRM) for MySQL 2.x before 2.1.1 allows remote attackers to execute arbitrary commands via vectors involving a crafted $MYSQL_BINPATH variable. La subrutina soHotCopy en socket-server.pl en Zmanda Recovery Manager (ZRM) para MySQL v2.x anterior a v2.1.1, permite a atacantes remotos ejecutar comandos de su elección a través de vectores que involucran una variable $MYSQL_BINPATH manipulada. • http://forums.zmanda.com/showthread.php?p=8068 http://secunia.com/advisories/36424 http://secunia.com/advisories/36429 http://twitter.com/elegerov/statuses/3518763099 http://twitter.com/elegerov/statuses/3547652507 http://www.intevydis.com/blog/?p=51 https://exchange.xforce.ibmcloud.com/vulnerabilities/52977 https://exchange.xforce.ibmcloud.com/vulnerabilities/52978 • CWE-20: Improper Input Validation •