CVE-2018-16518
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A directory traversal vulnerability with remote code execution in Prim'X Zed! FREE through 1.0 build 186 and Zed! Limited Edition through 6.1 build 2208 allows creation of arbitrary files on a user's workstation using crafted ZED! containers because the watermark loading function can place an executable file into a Startup folder.
Una vulnerabilidad de salto de directorio con ejecución remota de código en Prim'X Zed! FREE hasta la versión 1.0 build 186 y Zed! Limited Edition hasta la versión 6.1 build 2208 permite la creación de archivos arbitrarios en la estación de trabajo de un usuario mediante contenedores ZED! manipulados. Esto se debe a que la función de carga de marcas de agua puede colocar un archivo ejecutable en una carpeta Startup.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-09-05 CVE Reserved
- 2018-09-05 CVE Published
- 2024-09-17 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://github.com/ponypot/cve/blob/master/zed_watermarkExtension.pdf | Broken Link |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Primx Search vendor "Primx" | Zed\! Search vendor "Primx" for product "Zed\!" | <= 6.1 Search vendor "Primx" for product "Zed\!" and version " <= 6.1" | - |
Affected
| ||||||
Primx Search vendor "Primx" | Zed\! Free Search vendor "Primx" for product "Zed\! Free" | <= 1.0 Search vendor "Primx" for product "Zed\! Free" and version " <= 1.0" | - |
Affected
|