Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-4688

EPSS 1.75% · P83
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-4688

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
pfSense before 2.1.4 allows remote authenticated users to execute arbitrary commands via (1) the hostname value to diag_dns.php in a Create Alias action, (2) the smartmonemail value to diag_smart.php, or (3) the database value to status_rrd_graph_img.php.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Electric Sheep Fencing pfSense 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Electric Sheep Fencing pfsense是美国Electric Sheep Fencing公司的一套免费开源的基于FreeBSD的防火墙和路由器软件。 Electric Sheep Fencing pfSense 2.1.3及之前的版本中存在安全漏洞,该漏洞源于diag_dns.php脚本没有正确验证hostname值,diag_smart.php脚本没有正确验证smartmonemail值,status_rrd_graph_img.php脚本没有正确验证database值。远程攻击者
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-4688

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/andyfeili/CVE-2014-4688POC Details
2Authenticated Remote Command Execution – pfSense <= 2.1.3https://github.com/fenix0499/CVE-2014-4688-NodeJs-ExploitPOC Details
3Modified Exploit-DB proof-of-concept for CVE-2014-4688 (pfSense status_rrd_graph_img.php command injection)https://github.com/jaydenblair/CVE-2014-4688-pfsensePOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-4688

登录查看更多情报信息。

Same Patch Batch · n/a · 2014-07-02 · 76 CVEs total

CVE-2014-4594WordPress WordPress Responsive Preview 跨站脚本漏洞
CVE-2014-4691Electric Sheep Fencing pfSense 会话固定漏洞
CVE-2014-4604WordPress Your Text Manager 跨站脚本漏洞
CVE-2014-4603WordPress Yahoo! Updates for WordPress 跨站脚本漏洞
CVE-2014-4601WordPress Wu-Rating 跨站脚本漏洞
CVE-2014-4600WordPress WP Ultimate Email Marketer 跨站脚本漏洞
CVE-2014-4599WordPress WP-Business Directory 跨站脚本漏洞
CVE-2014-4598WordPress wp-tmkm-amazon 跨站脚本漏洞
CVE-2014-4596WordPress SnapApp 跨站脚本漏洞
CVE-2014-4595WordPress WP RESTful 跨站脚本漏洞
CVE-2014-4605WordPress ZdStatistics插件跨站脚本漏洞
CVE-2014-4593WordPress WP Plugin Manager 跨站脚本漏洞
CVE-2014-4590WordPress WP Microblogs 跨站脚本漏洞
CVE-2014-4589WordPress WP Silverlight Media Player 跨站脚本漏洞
CVE-2014-4588WordPress Hot Files: File Sharing and Download Manager 跨站脚本漏洞
CVE-2014-4587WordPress WP GuestMap 跨站脚本漏洞
CVE-2014-4582WordPress WP Consultant 跨站脚本漏洞
CVE-2014-4580WordPress WP BlipBot 跨站脚本漏洞
CVE-2014-4579WordPress Appointments Scheduler 跨站脚本漏洞
CVE-2014-4578WordPress WP App Maker 跨站脚本漏洞

Showing top 20 of 76 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2014-4688

No comments yet


Leave a comment