Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:*", "matchCriteriaId": "223ED6D4-4371-4D0F-89E4-D63ECA41C9BE", "versionEndIncluding": "2.10.72", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B37E638-D2DC-4187-BED3-147D07D1CFF6", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "478177D1-8E02-41C6-A11E-231B38F72500", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "106FD07A-A79B-4B4F-B3AF-0307F4F73599", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "E625CC27-DB3E-43B9-BA5E-977AE6CDDFEC", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "4745312C-C365-45B7-9DBD-0BCA19DC414C", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "D627634A-5227-4036-BA76-488215D481AF", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DD3EE4B-3BBC-4F38-8642-0585977E02B6", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.10:*:*:*:*:*:*:*", "matchCriteriaId": "9F64E4B1-D4B0-4DEC-9153-6639C73E3ED1", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.11:*:*:*:*:*:*:*", "matchCriteriaId": "46909A56-0F10-4064-9159-CD9171C3E391", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.12:*:*:*:*:*:*:*", "matchCriteriaId": "1F6B7DF0-314D-4AFD-8586-8759D424EAE0", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.13:*:*:*:*:*:*:*", "matchCriteriaId": "2EE12BE7-59A4-4E11-B61B-4AFE4E37F915", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.14:*:*:*:*:*:*:*", "matchCriteriaId": "8E68D785-CD78-444F-9189-E53B2B704FC9", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.15:*:*:*:*:*:*:*", "matchCriteriaId": "9DD05880-F918-4ACE-9A8B-9111B2C7E9DC", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.16:*:*:*:*:*:*:*", "matchCriteriaId": "CC63699C-44C2-4438-9680-F00DF07968EE", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.17:*:*:*:*:*:*:*", "matchCriteriaId": "099E73F3-44CC-486A-BD75-BEE21ABB7772", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18:*:*:*:*:*:*:*", "matchCriteriaId": "5E35FD8D-861B-43F2-A0F5-9B0E3D8E1C98", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "2084CF59-B915-4A73-9C81-43DB90983BC0", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.19:*:*:*:*:*:*:*", "matchCriteriaId": "341105EB-E780-489D-AD7B-7D037CF48AA6", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.20:*:*:*:*:*:*:*", "matchCriteriaId": "9533D5FB-53EF-4761-8D47-C5F4FA100816", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.21:*:*:*:*:*:*:*", "matchCriteriaId": "E9067394-FA00-4C62-A1D8-B791309A525F", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.22:*:*:*:*:*:*:*", "matchCriteriaId": "484F8413-C4B3-4E6D-AE03-FEB3D68478D7", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.23:*:*:*:*:*:*:*", "matchCriteriaId": "2F05DE13-E821-4DA2-9787-ADFDA1353660", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.24:*:*:*:*:*:*:*", "matchCriteriaId": "7742C715-0B2B-49BF-90D7-B4B5ABF2E159", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.25:*:*:*:*:*:*:*", "matchCriteriaId": "508DD68D-9803-4D43-B84F-3DF992A1730F", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.26:*:*:*:*:*:*:*", "matchCriteriaId": "37FB6D91-9FDE-4221-86C0-3F567534B210", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.27:*:*:*:*:*:*:*", "matchCriteriaId": "4803A5E0-9A78-47F2-88F4-99026DFAECC2", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.28:*:*:*:*:*:*:*", "matchCriteriaId": "5098A7EA-45F5-48CF-8C28-2E6DBB39353C", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.29:*:*:*:*:*:*:*", "matchCriteriaId": "B88248B3-94FE-4089-AFDB-670198DC3D14", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.30:*:*:*:*:*:*:*", "matchCriteriaId": "D23059A9-0B66-48F3-926A-F3C6EF8CF874", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.31:*:*:*:*:*:*:*", "matchCriteriaId": "6E049F90-064A-40BC-8C32-0C0CB1653A47", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.32:*:*:*:*:*:*:*", "matchCriteriaId": "FC6D9063-5269-4887-9242-A04A3D5400C5", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.33:*:*:*:*:*:*:*", "matchCriteriaId": "24DF21A7-41CC-41AA-B845-512030D8ADA6", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.34:*:*:*:*:*:*:*", "matchCriteriaId": "74F06A1D-A2DB-4CF7-A383-B3B4A552C657", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.35:*:*:*:*:*:*:*", "matchCriteriaId": "2366772D-5E39-4F59-B2E6-D75E1108A7FC", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.36:*:*:*:*:*:*:*", "matchCriteriaId": "2D589348-6C86-4487-9895-6272864AAC9D", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.38:*:*:*:*:*:*:*", "matchCriteriaId": "B303BA74-3849-4A2F-9113-291FFDFCD109", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.39:*:*:*:*:*:*:*", "matchCriteriaId": "5CBB13F4-CEDE-4C6C-9371-25D798129707", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.40:*:*:*:*:*:*:*", "matchCriteriaId": "80D2AD6E-9579-4E11-B098-59CF004A9D84", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.41:*:*:*:*:*:*:*", "matchCriteriaId": "702C25E2-FADF-4238-9A89-854A031F5C7A", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.42:*:*:*:*:*:*:*", "matchCriteriaId": "77CCBE14-BE1C-48E3-9FB7-B5F3530B62A8", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.43:*:*:*:*:*:*:*", "matchCriteriaId": "F2899892-1EEB-4C9E-AF10-F493653746DD", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.44:*:*:*:*:*:*:*", "matchCriteriaId": "36E86AF2-8140-46D5-B3FD-52EE1BE3C042", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.45:*:*:*:*:*:*:*", "matchCriteriaId": "B44E8E97-DE1B-4A2D-BA09-2C4C220FAE85", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.46:*:*:*:*:*:*:*", "matchCriteriaId": "539A35B0-EE2D-4049-AFC1-D5474DD3C6EC", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.47:*:*:*:*:*:*:*", "matchCriteriaId": "07F81B2A-62AA-4114-8496-C08B17407935", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.48:*:*:*:*:*:*:*", "matchCriteriaId": "55CE4566-800F-4ECC-BA6E-3EBBC3B5E3C7", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.49:*:*:*:*:*:*:*", "matchCriteriaId": "F47EF611-3277-4446-9291-7DF9C4AE361D", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.50:*:*:*:*:*:*:*", "matchCriteriaId": "FCBFB21B-E6D2-4923-A25A-717FB935C7ED", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.51:*:*:*:*:*:*:*", "matchCriteriaId": "E89BEBB8-8A3C-4B5A-9DD4-956892F34C1D", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.52:*:*:*:*:*:*:*", "matchCriteriaId": "69EC8278-845F-4654-83A5-416C912CD41E", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.53:*:*:*:*:*:*:*", "matchCriteriaId": "68C8BC4E-C3FA-4FD4-8291-C229EF36D38F", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.54:*:*:*:*:*:*:*", "matchCriteriaId": "4B19C6B3-7FF7-4264-9095-6A86A2637CCC", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.55:*:*:*:*:*:*:*", "matchCriteriaId": "C2FA99EC-4203-4192-9E44-A3A3E7FE0435", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.56:*:*:*:*:*:*:*", "matchCriteriaId": "88CE7625-887C-4AD6-B4BD-00AD6E32BE44", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.57:*:*:*:*:*:*:*", "matchCriteriaId": "302C034D-A86A-4CD2-AF4F-27C443981B42", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.58:*:*:*:*:*:*:*", "matchCriteriaId": "31838EE3-794C-4DB4-839B-49FA58AE0026", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.59:*:*:*:*:*:*:*", "matchCriteriaId": "D939A773-850F-4377-A521-77BA08A033A5", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.60:*:*:*:*:*:*:*", "matchCriteriaId": "6383E967-0CB2-4432-8799-405813BA980F", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.61:*:*:*:*:*:*:*", "matchCriteriaId": "BFECB8F8-DD51-4BE6-B595-A333132FDE54", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.62:*:*:*:*:*:*:*", "matchCriteriaId": "B90D9ADC-1724-401E-9750-0E4CD4146B25", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.63:*:*:*:*:*:*:*", "matchCriteriaId": "BCB7A241-1381-444D-8958-9ED6695CAA7F", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.64:*:*:*:*:*:*:*", "matchCriteriaId": "896579AF-B3E0-493A-A0B6-8B5EC0FB06AE", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.65.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE5B6D14-10C4-4F4C-A016-BFF6F961C821", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.66:*:*:*:*:*:*:*", "matchCriteriaId": "4B336857-91E4-4393-93C1-EB385509F4BC", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.67:*:*:*:*:*:*:*", "matchCriteriaId": "0653E1CF-52A7-4879-93FA-A6D25004217E", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.68:*:*:*:*:*:*:*", "matchCriteriaId": "3D8B375A-5E39-4A77-84E3-B57C42969AFE", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:*:*:*:*:*:*:*", "matchCriteriaId": "4F32D965-6ECB-45DE-B8C0-6D0329608F7E", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze1:*:*:*:*:*:*", "matchCriteriaId": "BB392DC6-8266-43BE-80DC-E98E139DD4C8", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze2:*:*:*:*:*:*", "matchCriteriaId": "D822A418-8E9A-4EA1-BA47-78913BDC780F", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze3:*:*:*:*:*:*", "matchCriteriaId": "03482021-66D0-4912-9A61-2F9774B21964", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze4:*:*:*:*:*:*", "matchCriteriaId": "8CC0A943-CE66-4ED2-92D3-1082572E7D68", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.70:*:*:*:*:*:*:*", "matchCriteriaId": "248AB1B9-0C9E-47DA-A268-2284B5DF8C92", "vulnerable": true}, {"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.71:*:*:*:*:*:*:*", "matchCriteriaId": "F4D376BD-6A57-449B-AA7F-E103CB38DD35", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "scripts/dget.pl in devscripts before 2.10.73 allows remote attackers to execute arbitrary commands via a crafted (1) .dsc or (2) .changes file, related to \"arguments to external commands\" that are not properly escaped, a different vulnerability than CVE-2012-2240."}, {"lang": "es", "value": "scripts/dget.pl en devscripts anterior a v2.10.73 permite a atacantes remotos ejecutar comandos arbitrarios mediante un fichero (1) .dsc o (2) .changes manipulado, relacionado con \"argumentos a comandos externos\" que no son escapados correctamente. Una vulnerabilidad diferente a CVE-2012-2240."}], "id": "CVE-2012-2242", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2012-10-01T00:55:01.337", "references": [{"source": "security@debian.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/50600"}, {"source": "security@debian.org", "url": "http://www.debian.org/security/2012/dsa-2549"}, {"source": "security@debian.org", "url": "http://www.securityfocus.com/bid/55564"}, {"source": "security@debian.org", "url": "http://www.ubuntu.com/usn/USN-1593-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/50600"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2549"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/55564"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1593-1"}], "sourceIdentifier": "security@debian.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}