{"id":"DSA-1473-1","summary":"scponly - arbitrary code execution","modified":"2026-03-09T01:22:10.362624Z","published":"2008-01-21T00:00:00Z","upstream":["CVE-2007-6350","CVE-2007-6415","DEBIAN-CVE-2007-6350","DEBIAN-CVE-2007-6415"],"affected":[{"package":{"name":"scponly","ecosystem":"Debian:3.1","purl":"pkg:deb/debian/scponly?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0-1sarge2"}]}],"versions":["4.0-1","4.0-1sarge1"],"database_specific":{"source":"https://storage.googleapis.com/debian-osv/dsa-osv/DSA-1473-1.json"}},{"package":{"name":"scponly","ecosystem":"Debian:4.0","purl":"pkg:deb/debian/scponly?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.6-1etch1"}]}],"versions":["4.6-1"],"database_specific":{"source":"https://storage.googleapis.com/debian-osv/dsa-osv/DSA-1473-1.json"}}],"schema_version":"1.7.3"}