Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2008-4641

The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and earlier allows attackers to execute arbitrary commands via shell metacharacters in unspecified input.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.02
EPSS Ranking 82.9%
CVSS Severity
CVSS v2 Score 10.0
Products affected by CVE-2008-4641
  • Sentex » Jhead » Version: Any
    cpe:2.3:a:sentex:jhead:*
  • Sentex » Jhead » Version: 1.2
    cpe:2.3:a:sentex:jhead:1.2
  • Sentex » Jhead » Version: 1.3
    cpe:2.3:a:sentex:jhead:1.3
  • Sentex » Jhead » Version: 1.4
    cpe:2.3:a:sentex:jhead:1.4
  • Sentex » Jhead » Version: 1.5
    cpe:2.3:a:sentex:jhead:1.5
  • Sentex » Jhead » Version: 1.6
    cpe:2.3:a:sentex:jhead:1.6
  • Sentex » Jhead » Version: 1.7
    cpe:2.3:a:sentex:jhead:1.7
  • Sentex » Jhead » Version: 1.8
    cpe:2.3:a:sentex:jhead:1.8
  • Sentex » Jhead » Version: 1.9
    cpe:2.3:a:sentex:jhead:1.9
  • Sentex » Jhead » Version: 2.0
    cpe:2.3:a:sentex:jhead:2.0
  • Sentex » Jhead » Version: 2.1
    cpe:2.3:a:sentex:jhead:2.1
  • Sentex » Jhead » Version: 2.2
    cpe:2.3:a:sentex:jhead:2.2
  • Sentex » Jhead » Version: 2.3
    cpe:2.3:a:sentex:jhead:2.3
  • Sentex » Jhead » Version: 2.4
    cpe:2.3:a:sentex:jhead:2.4
  • Sentex » Jhead » Version: 2.4-1
    cpe:2.3:a:sentex:jhead:2.4-1
  • Sentex » Jhead » Version: 2.4-2
    cpe:2.3:a:sentex:jhead:2.4-2
  • Sentex » Jhead » Version: 2.5
    cpe:2.3:a:sentex:jhead:2.5
  • Sentex » Jhead » Version: 2.6
    cpe:2.3:a:sentex:jhead:2.6
  • Sentex » Jhead » Version: 2.7
    cpe:2.3:a:sentex:jhead:2.7
  • Sentex » Jhead » Version: 2.8
    cpe:2.3:a:sentex:jhead:2.8


Contact Us

Shodan ® - All rights reserved