Vulnerability Details CVE-2012-6123
Chicken before 4.8.0 does not properly handle NUL bytes in certain strings, which allows an attacker to conduct "poisoned NUL byte attack."
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 61.4%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 5.0
Products affected by CVE-2012-6123
-
cpe:2.3:a:call-cc:chicken:-
-
cpe:2.3:a:call-cc:chicken:3.0.0
-
cpe:2.3:a:call-cc:chicken:3.1.0
-
cpe:2.3:a:call-cc:chicken:3.2.0
-
cpe:2.3:a:call-cc:chicken:3.3.0
-
cpe:2.3:a:call-cc:chicken:3.4.0
-
cpe:2.3:a:call-cc:chicken:4.0.0
-
cpe:2.3:a:call-cc:chicken:4.1.0
-
cpe:2.3:a:call-cc:chicken:4.2.0
-
cpe:2.3:a:call-cc:chicken:4.3.0
-
cpe:2.3:a:call-cc:chicken:4.3.3
-
cpe:2.3:a:call-cc:chicken:4.3.4
-
cpe:2.3:a:call-cc:chicken:4.3.5
-
cpe:2.3:a:call-cc:chicken:4.3.6
-
cpe:2.3:a:call-cc:chicken:4.3.7
-
cpe:2.3:a:call-cc:chicken:4.4.0
-
cpe:2.3:a:call-cc:chicken:4.4.3
-
cpe:2.3:a:call-cc:chicken:4.4.4
-
cpe:2.3:a:call-cc:chicken:4.4.5
-
cpe:2.3:a:call-cc:chicken:4.4.6
-
cpe:2.3:a:call-cc:chicken:4.5.0
-
cpe:2.3:a:call-cc:chicken:4.5.2
-
cpe:2.3:a:call-cc:chicken:4.5.5
-
cpe:2.3:a:call-cc:chicken:4.5.6
-
cpe:2.3:a:call-cc:chicken:4.5.7
-
cpe:2.3:a:call-cc:chicken:4.6.0
-
cpe:2.3:a:call-cc:chicken:4.6.1
-
cpe:2.3:a:call-cc:chicken:4.6.2
-
cpe:2.3:a:call-cc:chicken:4.6.3
-
cpe:2.3:a:call-cc:chicken:4.6.5
-
cpe:2.3:a:call-cc:chicken:4.6.6
-
cpe:2.3:a:call-cc:chicken:4.6.7
-
cpe:2.3:a:call-cc:chicken:4.7.0
-
cpe:2.3:a:call-cc:chicken:4.7.0.6
-
cpe:2.3:a:call-cc:chicken:4.7.2
-
cpe:2.3:a:call-cc:chicken:4.7.3
-
cpe:2.3:a:call-cc:chicken:4.7.4
-
cpe:2.3:o:debian:debian_linux:10.0
-
cpe:2.3:o:debian:debian_linux:8.0
-
cpe:2.3:o:debian:debian_linux:9.0