Loading...
Loading...
AFFLIB 2.2.8 and earlier allows attackers to execute arbitrary commands via shell metacharacters involving (1) certain command line parameters in tools/afconvert.cpp and (2) arguments to the get_parameter function in aimage/ident.cpp. NOTE: it is unknown if the get_parameter vector (2) is ever called.
April 30, 2007
April 23, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2007-2055
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.