Safety vulnerability ID: 65836
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The Trigger plugin in bcfg2 1.2.x before 1.2.3 allows remote attackers with root access to the client to execute arbitrary commands via shell metacharacters in the UUID field to the server process (bcfg2-server).
Latest version: 1.3.4
Bcfg2 Server
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application