Unrated severityNVD Advisory· Published May 23, 2006· Updated Apr 16, 2026
CVE-2006-2550
CVE-2006-2550
Description
perlpodder before 0.5 allows remote attackers to execute arbitrary code via shell metacharacters in the URL of a podcast, which are executed when saving the URL to a log file. NOTE: the wget vector is already covered by CVE-2006-2548.
Affected products
3cpe:2.3:a:perlpodder:perlpodder:*:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:perlpodder:perlpodder:*:*:*:*:*:*:*:*range: <=0.4
- cpe:2.3:a:perlpodder:perlpodder:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:perlpodder:perlpodder:0.3:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- www.redteam-pentesting.de/advisories/rt-sa-2006-003.phpnvdExploitVendor Advisory
- www.securityfocus.com/bid/18067nvdExploit
- archives.neohapsis.com/archives/fulldisclosure/2006-05/0570.htmlnvd
- secunia.com/advisories/20238nvd
- www.osvdb.org/25708nvd
- www.securityfocus.com/archive/1/434711/100/0/threadednvd
- www.vupen.com/english/advisories/2006/1906nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26575nvd
News mentions
0No linked articles in our index yet.