2 results (0.010 seconds)

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

pfSense pfBlockerNG through 2.1.4_27 allows remote attackers to execute arbitrary OS commands as root via the HTTP Host header, a different vulnerability than CVE-2022-31814. pfSense pfBlockerNG hasta 2.1.4_27 permite a atacantes remotos ejecutar comandos arbitrarios del Sistema Operativo como root a través del encabezado HTTP Host, una vulnerabilidad diferente a CVE-2022-31814. • https://github.com/dhammon/pfBlockerNg-CVE-2022-40624 https://docs.netgate.com/pfsense/en/latest/packages/pfblocker.html https://github.com/dhammon/pfBlockerNg-RCE • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 96%CPEs: 1EXPL: 9

pfSense pfBlockerNG through 2.1.4_26 allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected. pfSense pfBlockerNG versiones hasta 2.1.4_26, permite a atacantes remotos ejecutar comandos arbitrarios del Sistema Operativo como root por medio de metacaracteres de shell en el encabezado HTTP Host. NOTA: la versión 3.x no está afectada • https://www.exploit-db.com/exploits/51032 https://github.com/Laburity/CVE-2022-31814 https://github.com/Chocapikk/CVE-2022-31814 https://github.com/Madliife0/CVE-2022-31814 https://github.com/TheUnknownSoul/CVE-2022-31814 https://github.com/ArunHAtter/CVE-2022-31814 https://github.com/dkstar11q/CVE-2022-31814 http://packetstormsecurity.com/files/168743/pfSense-pfBlockerNG-2.1.4_26-Shell-Upload.html http://packetstormsecurity.com/files/171123/pfBlockerNG-2.1.4_26-Remote-Code-Execution&# • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •