Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2011-3211

The server in Bcfg2 1.1.2 and earlier, and 1.2 prerelease, allows remote attackers to execute arbitrary commands via shell metacharacters in data received from a client.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.024
EPSS Ranking 84.3%
CVSS Severity
CVSS v2 Score 9.3
References
Products affected by CVE-2011-3211
  • Bcfg2 » Bcfg2 » Version: Any
    cpe:2.3:a:bcfg2:bcfg2:*
  • Bcfg2 » Bcfg2 » Version: 0.3.1
    cpe:2.3:a:bcfg2:bcfg2:0.3.1
  • Bcfg2 » Bcfg2 » Version: 0.4
    cpe:2.3:a:bcfg2:bcfg2:0.4
  • Bcfg2 » Bcfg2 » Version: 0.5
    cpe:2.3:a:bcfg2:bcfg2:0.5
  • Bcfg2 » Bcfg2 » Version: 0.6
    cpe:2.3:a:bcfg2:bcfg2:0.6
  • Bcfg2 » Bcfg2 » Version: 0.6.1
    cpe:2.3:a:bcfg2:bcfg2:0.6.1
  • Bcfg2 » Bcfg2 » Version: 0.6.10
    cpe:2.3:a:bcfg2:bcfg2:0.6.10
  • Bcfg2 » Bcfg2 » Version: 0.6.3
    cpe:2.3:a:bcfg2:bcfg2:0.6.3
  • Bcfg2 » Bcfg2 » Version: 0.6.4
    cpe:2.3:a:bcfg2:bcfg2:0.6.4
  • Bcfg2 » Bcfg2 » Version: 0.6.5
    cpe:2.3:a:bcfg2:bcfg2:0.6.5
  • Bcfg2 » Bcfg2 » Version: 0.6.6
    cpe:2.3:a:bcfg2:bcfg2:0.6.6
  • Bcfg2 » Bcfg2 » Version: 0.6.7
    cpe:2.3:a:bcfg2:bcfg2:0.6.7
  • Bcfg2 » Bcfg2 » Version: 0.6.8
    cpe:2.3:a:bcfg2:bcfg2:0.6.8
  • Bcfg2 » Bcfg2 » Version: 0.6.9
    cpe:2.3:a:bcfg2:bcfg2:0.6.9
  • Bcfg2 » Bcfg2 » Version: 0.7.0
    cpe:2.3:a:bcfg2:bcfg2:0.7.0
  • Bcfg2 » Bcfg2 » Version: 0.7.1
    cpe:2.3:a:bcfg2:bcfg2:0.7.1
  • Bcfg2 » Bcfg2 » Version: 0.7.2
    cpe:2.3:a:bcfg2:bcfg2:0.7.2
  • Bcfg2 » Bcfg2 » Version: 0.7.3
    cpe:2.3:a:bcfg2:bcfg2:0.7.3
  • Bcfg2 » Bcfg2 » Version: 0.7.4
    cpe:2.3:a:bcfg2:bcfg2:0.7.4
  • Bcfg2 » Bcfg2 » Version: 0.8.0
    cpe:2.3:a:bcfg2:bcfg2:0.8.0
  • Bcfg2 » Bcfg2 » Version: 0.8.1
    cpe:2.3:a:bcfg2:bcfg2:0.8.1
  • Bcfg2 » Bcfg2 » Version: 0.8.2
    cpe:2.3:a:bcfg2:bcfg2:0.8.2
  • Bcfg2 » Bcfg2 » Version: 0.8.3
    cpe:2.3:a:bcfg2:bcfg2:0.8.3
  • Bcfg2 » Bcfg2 » Version: 0.8.4
    cpe:2.3:a:bcfg2:bcfg2:0.8.4
  • Bcfg2 » Bcfg2 » Version: 0.8.5
    cpe:2.3:a:bcfg2:bcfg2:0.8.5
  • Bcfg2 » Bcfg2 » Version: 0.8.6.1
    cpe:2.3:a:bcfg2:bcfg2:0.8.6.1
  • Bcfg2 » Bcfg2 » Version: 0.8.7
    cpe:2.3:a:bcfg2:bcfg2:0.8.7
  • Bcfg2 » Bcfg2 » Version: 0.8.7.1
    cpe:2.3:a:bcfg2:bcfg2:0.8.7.1
  • Bcfg2 » Bcfg2 » Version: 0.8.7.2
    cpe:2.3:a:bcfg2:bcfg2:0.8.7.2
  • Bcfg2 » Bcfg2 » Version: 0.9.0
    cpe:2.3:a:bcfg2:bcfg2:0.9.0
  • Bcfg2 » Bcfg2 » Version: 0.9.1d
    cpe:2.3:a:bcfg2:bcfg2:0.9.1d
  • Bcfg2 » Bcfg2 » Version: 0.9.2
    cpe:2.3:a:bcfg2:bcfg2:0.9.2
  • Bcfg2 » Bcfg2 » Version: 0.9.3
    cpe:2.3:a:bcfg2:bcfg2:0.9.3
  • Bcfg2 » Bcfg2 » Version: 0.9.4
    cpe:2.3:a:bcfg2:bcfg2:0.9.4
  • Bcfg2 » Bcfg2 » Version: 0.9.5
    cpe:2.3:a:bcfg2:bcfg2:0.9.5
  • Bcfg2 » Bcfg2 » Version: 0.9.5.1
    cpe:2.3:a:bcfg2:bcfg2:0.9.5.1
  • Bcfg2 » Bcfg2 » Version: 0.9.5.2
    cpe:2.3:a:bcfg2:bcfg2:0.9.5.2
  • Bcfg2 » Bcfg2 » Version: 0.9.5.3
    cpe:2.3:a:bcfg2:bcfg2:0.9.5.3
  • Bcfg2 » Bcfg2 » Version: 0.9.5.5
    cpe:2.3:a:bcfg2:bcfg2:0.9.5.5
  • Bcfg2 » Bcfg2 » Version: 0.9.5.7
    cpe:2.3:a:bcfg2:bcfg2:0.9.5.7
  • Bcfg2 » Bcfg2 » Version: 0.9.6
    cpe:2.3:a:bcfg2:bcfg2:0.9.6
  • Bcfg2 » Bcfg2 » Version: 1.0
    cpe:2.3:a:bcfg2:bcfg2:1.0
  • Bcfg2 » Bcfg2 » Version: 1.0.0
    cpe:2.3:a:bcfg2:bcfg2:1.0.0
  • Bcfg2 » Bcfg2 » Version: 1.0.1
    cpe:2.3:a:bcfg2:bcfg2:1.0.1
  • Bcfg2 » Bcfg2 » Version: 1.1.0
    cpe:2.3:a:bcfg2:bcfg2:1.1.0
  • Bcfg2 » Bcfg2 » Version: 1.1.1
    cpe:2.3:a:bcfg2:bcfg2:1.1.1
  • Bcfg2 » Bcfg2 » Version: 1.2
    cpe:2.3:a:bcfg2:bcfg2:1.2


Contact Us

Shodan ® - All rights reserved