Page 11 of 51 results (0.006 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

pfSense before 2.1.4 allows remote authenticated users to execute arbitrary commands via (1) the hostname value to diag_dns.php in a Create Alias action, (2) the smartmonemail value to diag_smart.php, or (3) the database value to status_rrd_graph_img.php. pfSense anterior a 2.1.4 permite a usuarios remotos autenticados ejecutar comandos arbitrarios a través del valor (1) hostname en diag_dns.php en una acción Crear Alias, (2) smartmonemail en diag_smart.php, o (3) database en status_rrd_graph_img.php. pfSense versions 2.1.3 and below suffer from a status_rrd_graph_img.php command injection vulnerability. • https://www.exploit-db.com/exploits/43560 https://github.com/andyfeili/CVE-2014-4688 https://pfsense.org/security/advisories/pfSense-SA-14_10.webgui.asc •