picocom before 2.0 has a command injection vulnerability in the 'send and receive file' command because the command line is executed by /bin/sh unsafely.
References
Link | Resource |
---|---|
https://github.com/npat-efault/picocom/commit/1ebc60b20fbe9a02436d5cbbf8951714e749ddb1 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00030.html |
Configurations
Information
Published : 2017-05-27 17:29
Updated : 2020-06-28 10:15
NVD link : CVE-2015-9059
Mitre link : CVE-2015-9059
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
picocom_project
- picocom