VYPR
Unrated severityNVD Advisory· Published Dec 28, 2005· Updated Apr 16, 2026

CVE-2005-4533

CVE-2005-4533

Description

Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via "getopt" style argument specifications, which are not filtered.

Affected products

8
  • Scponly/Scponly8 versions
    cpe:2.3:a:scponly:scponly:2.0:*:*:*:*:*:*:*+ 7 more
    • cpe:2.3:a:scponly:scponly:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:scponly:scponly:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:scponly:scponly:3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:scponly:scponly:3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:scponly:scponly:3.5:*:*:*:*:*:*:*
    • cpe:2.3:a:scponly:scponly:3.8:*:*:*:*:*:*:*
    • cpe:2.3:a:scponly:scponly:3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:scponly:scponly:4.1:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.