
CVE-2025-34095 – Mako Server v2.5 and v2.6 OS Command Injection via examples/save.lsp
https://notcve.org/view.php?id=CVE-2025-34095
10 Jul 2025 — An OS command injection vulnerability exists in Mako Server versions 2.5 and 2.6, specifically within the tutorial interface provided by the examples/save.lsp endpoint. An unauthenticated attacker can send a crafted PUT request containing arbitrary Lua os.execute() code, which is then persisted on disk and triggered via a subsequent GET request to examples/manage.lsp. This allows remote command execution on the underlying operating system, impacting both Windows and Unix-based deployments. • https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/makoserver_cmd_exec.rb • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2007-6316 – barracudadrive 3.7.2 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2007-6316
12 Dec 2007 — Cross-site scripting (XSS) vulnerability in BarracudaDrive Web Server before 3.8 allows remote attackers to inject arbitrary web script or HTML via the URI path in an HTTP GET request, which is activated by administrators viewing log files via the Trace page. Vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en el servidor web BarracudaDrive anterior a 3.8 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de la ruta URI en una respuesta HTTP GET, la cual es activ... • https://www.exploit-db.com/exploits/4713 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2007-6315 – barracudadrive 3.7.2 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2007-6315
12 Dec 2007 — Group Chat in BarracudaDrive Web Server before 3.8 allows remote authenticated users to cause a denial of service (crash) via a HTTP request to /eh/chat.ehintf/C. that does not contain a Connection ID, which results in a NULL pointer dereference. Group Chat en el servidor web BarracudaDrive anterior a 3.8 permite a usuarios remotos validados provocar denegación de servicio (caida) a tavés de una respuesta HTTP en /eh/chat.ehintf/C. que no contiene un conexión ID, la cual deriva en una referencia a un punter... • https://www.exploit-db.com/exploits/4713 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2007-6314 – barracudadrive 3.7.2 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2007-6314
12 Dec 2007 — BarracudaDrive Web Server before 3.8 allows remote attackers to read the source code for web scripts by appending a (1) + (plus), (2) . (dot), or (3) %80 and similar characters to the file name in the URL. El servidor web BarracudaDrive anterior 3.8 permite a atacantes remotos leer el código fuente para secuencias de comandos web para añadir una (1) + (suma), (2) . (punto), o (3) %80 y caracteres similares al nombre de archivo en la URL. • https://www.exploit-db.com/exploits/4713 • CWE-20: Improper Input Validation •

CVE-2007-6317 – barracudadrive 3.7.2 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2007-6317
12 Dec 2007 — Multiple directory traversal vulnerabilities in BarracudaDrive Web Server before 3.8 allow (1) remote attackers to read arbitrary files via certain ..\ (dot dot backslash) sequences in the URL path, or (2) remote authenticated users to delete arbitrary files or create arbitrary directories via a ..\ (dot dot backslash) sequence in the dir parameter to /drive/c/bdusers/USER/. Múltiples vulnerabilidad de salto de directorio en el servidor web BarracudaDrive anterior a 3.8 permite a atacantes remotos leer arch... • https://www.exploit-db.com/exploits/4713 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •