10
CVSSv2

CVE-2008-4318

Published: 29/09/2008 Updated: 29/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Observer 0.3.2.1 and previous versions allows remote malicious users to execute arbitrary commands via shell metacharacters in the query parameter to (1) whois.php or (2) netcmd.php.

Vulnerable Product Search on Vulmon Subscribe to Product

project-observer observer 0.2.3

project-observer observer 0.2.2

project-observer observer 0.3.1

project-observer observer 0.30-pre-1

project-observer observer 0.1.2

project-observer observer 0.1.1

project-observer observer 0.1.0

project-observer observer 0.2.5

project-observer observer 0.2.4

project-observer observer

project-observer observer 0.3.2

project-observer observer 0.2.1

project-observer observer 0.2.0

Exploits

:::::::- :::::: ::: ;;, `';, ;; ;;;`;;;;, `;;; `[[ [[[[' [[[ [[[[[ '[[ $$, $$$$ $$$ $$$ "Y$c$$ 888_,o8P'88 d888 888 Y88 MMMMP"` "YmmMMMM"" MMM YM [ Discovered by dun \ dun[at]strcpypl ] ######################################################### # [ observer <= 0 ...

Github Repositories

Most Secure Calculator This repository demonstrates how security best practices for a Go CLI application & backend service can be implemented on GitHub using GitHub Actions It features security best practices such as: Git commit signing (gitsign) and verification (chaingurad/enforce) Integrity protected SBOM generation (anchore/syft) and vulnerability scanning (ancho