Lucene search

K

CVE-2014-1927

πŸ—“οΈΒ 25 Oct 2014Β 21:03:55Reported byΒ Debian Security Bug TrackerTypeΒ 
debiancve
Β debiancve
πŸ”—Β security-tracker.debian.orgπŸ‘Β 21Β Views

The python-gnupg 0.3.5 shell_quote function allows arbitrary code execution via shell metacharacter

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Packages
ReporterTitlePublishedViews
Family
CVE
CVE-2014-1927
25 Oct 201421:55
–cve
CVE
CVE-2014-1928
25 Oct 201421:55
–cve
CVE
CVE-2013-7323
9 Jun 201419:55
–cve
CVE
CVE-2014-1929
25 Oct 201421:55
–cve
Github Security Blog
python-gnupg's shell_quote function does not properly quote strings
6 Nov 201823:14
–github
Github Security Blog
python-gnupg's shell_quote function does not properly escape characters
6 Nov 201823:13
–github
Github Security Blog
python-gnupg allows context-dependent attackers to execute arbitrary commands via shell metacharacters
6 Nov 201823:14
–github
Github Security Blog
python-gnupg vulnerable to shell injection
6 Nov 201823:12
–github
Prion
Design/Logic Flaw
25 Oct 201421:55
–prion
Prion
Design/Logic Flaw
25 Oct 201421:55
–prion
Rows per page
OSOS VersionArchitecturePackagePackage VersionFilename
Debian12allpython-gnupg0.3.6-1python-gnupg_0.3.6-1_all.deb
Debian11allpython-gnupg0.3.6-1python-gnupg_0.3.6-1_all.deb
Debian999allpython-gnupg0.3.6-1python-gnupg_0.3.6-1_all.deb
Debian13allpython-gnupg0.3.6-1python-gnupg_0.3.6-1_all.deb

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
25 Oct 2014 21:55Current
7.3High risk
Vulners AI Score7.3
CVSS27.5
EPSS0.01162
21
.json
Report