cpe:/a:devscripts_devel_team:devscripts:2.10.0 cpe:/a:devscripts_devel_team:devscripts:2.10.1 cpe:/a:devscripts_devel_team:devscripts:2.10.3 cpe:/a:devscripts_devel_team:devscripts:2.10.6 cpe:/a:devscripts_devel_team:devscripts:2.10.7 cpe:/a:devscripts_devel_team:devscripts:2.10.8 cpe:/a:devscripts_devel_team:devscripts:2.10.9 cpe:/a:devscripts_devel_team:devscripts:2.10.10 cpe:/a:devscripts_devel_team:devscripts:2.10.11 cpe:/a:devscripts_devel_team:devscripts:2.10.12 cpe:/a:devscripts_devel_team:devscripts:2.10.13 cpe:/a:devscripts_devel_team:devscripts:2.10.14 cpe:/a:devscripts_devel_team:devscripts:2.10.15 cpe:/a:devscripts_devel_team:devscripts:2.10.16 cpe:/a:devscripts_devel_team:devscripts:2.10.17 cpe:/a:devscripts_devel_team:devscripts:2.10.18 cpe:/a:devscripts_devel_team:devscripts:2.10.18.1 cpe:/a:devscripts_devel_team:devscripts:2.10.19 cpe:/a:devscripts_devel_team:devscripts:2.10.20 cpe:/a:devscripts_devel_team:devscripts:2.10.21 cpe:/a:devscripts_devel_team:devscripts:2.10.22 cpe:/a:devscripts_devel_team:devscripts:2.10.23 cpe:/a:devscripts_devel_team:devscripts:2.10.24 cpe:/a:devscripts_devel_team:devscripts:2.10.25 cpe:/a:devscripts_devel_team:devscripts:2.10.26 cpe:/a:devscripts_devel_team:devscripts:2.10.27 cpe:/a:devscripts_devel_team:devscripts:2.10.28 cpe:/a:devscripts_devel_team:devscripts:2.10.29 cpe:/a:devscripts_devel_team:devscripts:2.10.30 cpe:/a:devscripts_devel_team:devscripts:2.10.31 cpe:/a:devscripts_devel_team:devscripts:2.10.32 cpe:/a:devscripts_devel_team:devscripts:2.10.33 cpe:/a:devscripts_devel_team:devscripts:2.10.34 cpe:/a:devscripts_devel_team:devscripts:2.10.35 cpe:/a:devscripts_devel_team:devscripts:2.10.36 cpe:/a:devscripts_devel_team:devscripts:2.10.38 cpe:/a:devscripts_devel_team:devscripts:2.10.39 cpe:/a:devscripts_devel_team:devscripts:2.10.40 cpe:/a:devscripts_devel_team:devscripts:2.10.41 cpe:/a:devscripts_devel_team:devscripts:2.10.42 cpe:/a:devscripts_devel_team:devscripts:2.10.43 cpe:/a:devscripts_devel_team:devscripts:2.10.44 cpe:/a:devscripts_devel_team:devscripts:2.10.45 cpe:/a:devscripts_devel_team:devscripts:2.10.46 cpe:/a:devscripts_devel_team:devscripts:2.10.47 cpe:/a:devscripts_devel_team:devscripts:2.10.48 cpe:/a:devscripts_devel_team:devscripts:2.10.49 cpe:/a:devscripts_devel_team:devscripts:2.10.50 cpe:/a:devscripts_devel_team:devscripts:2.10.51 cpe:/a:devscripts_devel_team:devscripts:2.10.52 cpe:/a:devscripts_devel_team:devscripts:2.10.53 cpe:/a:devscripts_devel_team:devscripts:2.10.54 cpe:/a:devscripts_devel_team:devscripts:2.10.55 cpe:/a:devscripts_devel_team:devscripts:2.10.56 cpe:/a:devscripts_devel_team:devscripts:2.10.57 cpe:/a:devscripts_devel_team:devscripts:2.10.58 cpe:/a:devscripts_devel_team:devscripts:2.10.59 cpe:/a:devscripts_devel_team:devscripts:2.10.60 cpe:/a:devscripts_devel_team:devscripts:2.10.61 cpe:/a:devscripts_devel_team:devscripts:2.10.62 cpe:/a:devscripts_devel_team:devscripts:2.10.63 cpe:/a:devscripts_devel_team:devscripts:2.10.64 cpe:/a:devscripts_devel_team:devscripts:2.10.65.1 cpe:/a:devscripts_devel_team:devscripts:2.10.66 cpe:/a:devscripts_devel_team:devscripts:2.10.67 cpe:/a:devscripts_devel_team:devscripts:2.10.68 cpe:/a:devscripts_devel_team:devscripts:2.11.0 cpe:/a:devscripts_devel_team:devscripts:2.11.1 cpe:/a:devscripts_devel_team:devscripts:2.11.2 cpe:/a:devscripts_devel_team:devscripts:2.11.3 CVE-2012-0210 2012-06-15T20:55:05.857-04:00 2017-08-28T21:30:52.443-04:00 9.3 NETWORK MEDIUM NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2012-06-18T12:51:00.000-04:00 SECUNIA 47955 SECUNIA 48039 BID 52029 OSVDB 79319 DEBIAN DSA-2409 UBUNTU USN-1366-1 XF devscripts-dsc-code-execution(73215) CONFIRM http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=797ddc961532eb0aeb46153e3f28c8e9ea0500d2 debdiff.pl in devscripts 2.10.x before 2.10.69 and 2.11.x before 2.11.4 allows remote attackers to obtain system information and execute arbitrary code via the file name in a (1) .dsc or (2) .changes file.