{ "schema_version": "1.4.0", "id": "GHSA-r9r9-p68f-q4fg", "modified": "2022-05-01T18:44:39Z", "published": "2022-05-01T18:44:39Z", "aliases": [ "CVE-2007-6610" ], "details": "unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6610" }, { "type": "WEB", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448437" }, { "type": "WEB", "url": "http://bugs.gentoo.org/show_bug.cgi?id=203106" }, { "type": "WEB", "url": "http://osvdb.org/42759" }, { "type": "WEB", "url": "http://secunia.com/advisories/28282" }, { "type": "WEB", "url": "http://secunia.com/advisories/28388" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200801-01.xml" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/27182" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-01-03T20:46:00Z" } }