source: http://www.securityfocus.com/bid/9922/info It has been reported that the FVWM fvwm_make_browse_menu.sh script is prone to a command execution vulnerability. This issue is due to the script allowing a user to define which application should be used to execute the file via its filename. An attacker may be able to leverage this issue to cause arbitrary commands to be executed with the privileges of a victim user. $ touch 'Exec xmessage "0wn3d"'
Related ExploitsTrying to match OSVDBs (1): 5442
Other Possible E-DB Search Terms: FVWM 2.4.17/2.5.8, FVWM 2.4.17, FVWM
|2003-12-05||FVWM 2.4/2.5 - fvwm-menu-Directory Command Execution||auto22238|