CVE-2006-0225 : Detail

CVE-2006-0225

1.16%V3
Local
2006-01-25
10h00 +00:00
2018-10-19
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.6 AV:L/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Openbsd>>Openssh >> Version 3.0

Openbsd>>Openssh >> Version 3.0.1

Openbsd>>Openssh >> Version 3.0.1p1

Openbsd>>Openssh >> Version 3.0.2

Openbsd>>Openssh >> Version 3.0.2p1

Openbsd>>Openssh >> Version 3.0p1

Openbsd>>Openssh >> Version 3.1

Openbsd>>Openssh >> Version 3.1p1

Openbsd>>Openssh >> Version 3.2

Openbsd>>Openssh >> Version 3.2.2p1

Openbsd>>Openssh >> Version 3.2.3p1

Openbsd>>Openssh >> Version 3.3

Openbsd>>Openssh >> Version 3.3p1

Openbsd>>Openssh >> Version 3.4

Openbsd>>Openssh >> Version 3.4p1

Openbsd>>Openssh >> Version 3.5

Openbsd>>Openssh >> Version 3.5p1

Openbsd>>Openssh >> Version 3.6

Openbsd>>Openssh >> Version 3.6.1

Openbsd>>Openssh >> Version 3.6.1p1

Openbsd>>Openssh >> Version 3.6.1p2

Openbsd>>Openssh >> Version 3.7

Openbsd>>Openssh >> Version 3.7.1

Openbsd>>Openssh >> Version 3.7.1p2

Openbsd>>Openssh >> Version 3.8

Openbsd>>Openssh >> Version 3.8.1

Openbsd>>Openssh >> Version 3.8.1p1

Openbsd>>Openssh >> Version 3.9

Openbsd>>Openssh >> Version 3.9.1

Openbsd>>Openssh >> Version 3.9.1p1

Openbsd>>Openssh >> Version 4.0p1

Openbsd>>Openssh >> Version 4.1p1

Openbsd>>Openssh >> Version 4.2p1

References

http://www.securityfocus.com/bid/16369
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/25936
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18798
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/23340
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-0298.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/18970
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/21492
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Tags : third-party-advisory, x_refsource_CERT
http://www.trustix.org/errata/2006/0004
Tags : vendor-advisory, x_refsource_TRUSTIX
http://secunia.com/advisories/19159
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18650
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18736
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/22692
Tags : vdb-entry, x_refsource_OSVDB
http://www.vupen.com/english/advisories/2007/2120
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/23680
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18579
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18969
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20723
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:034
Tags : vendor-advisory, x_refsource_MANDRIVA
http://securityreason.com/securityalert/462
Tags : third-party-advisory, x_refsource_SREASON
http://www.vupen.com/english/advisories/2006/4869
Tags : vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/archive/1/425397/100/0/threaded
Tags : vendor-advisory, x_refsource_FEDORA
http://www.redhat.com/support/errata/RHSA-2006-0044.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/21262
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25607
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/2490
Tags : vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/0306
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/21129
Tags : third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1015540
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/21724
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/23241
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/0930
Tags : vdb-entry, x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1
Tags : vendor-advisory, x_refsource_SUNALERT
http://secunia.com/advisories/18850
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/22196
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-0698.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/18595
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18964
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-255-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/18910
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24479
Tags : third-party-advisory, x_refsource_SECUNIA