This CPE summary could be partial or incomplete. Please contact us for a detailed listing.
Summary
Detail | |||
---|---|---|---|
Vendor | Documentcloud | First view | 2013-04-25 |
Product | Karteek-Docsplit | Last view | 2013-04-25 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:documentcloud:karteek-docsplit:0.5.4:*:*:*:*:*:*:* | 1 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.3 | 2013-04-25 | CVE-2013-1933 | The extract_from_ocr function in lib/docsplit/text_extractor.rb in the Karteek Docsplit (karteek-docsplit) gem 0.5.4 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a PDF filename. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |