Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-6633

EPSS 1.03% · P78
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-6633

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain in the webdav module or (2) the formula field in the price_list module.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Tryton 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Tryton是一套基于Python和PostgreSQL的通用应用平台,它是OpenERP(企业资源计划ERP和客户关系管理CRM系统)的一个独立分支项目,包含了财务管理、营销管理、客户关系管理等模块,可用于创建企业资源计划系统。 Tryton中的‘safe_eval’函数存在命令注入漏洞。远程攻击者可借助collection.domain(位于webdav模块)或formula字段(位于price_list模块)中的shell元字符利用该漏洞执行任意命令。以下版本受到影响:Tryton 2.4.15之前
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-6633

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-6633

Please Login to view more intelligence information

Same Patch Batch · n/a · 2018-04-12 · 42 CVEs total

CVE-2015-4557WordPress Nextend Twitter Connect插件跨站脚本漏洞
CVE-2018-10068Joomla! jDownloads扩展安全漏洞
CVE-2018-10071Jungo DriverWizard WinDriver 输入验证漏洞
CVE-2018-10072Jungo DriverWizard WinDriver 输入验证漏洞
CVE-2018-10073joyplus-cms 跨站脚本漏洞
CVE-2018-10074Linux kernel 安全漏洞
CVE-2018-10059Cacti 跨站脚本漏洞
CVE-2018-10060Cacti 跨站脚本漏洞
CVE-2018-10061Cacti 跨站脚本漏洞
CVE-2014-6309Kaazing Gateway HTTP和WebSocket引擎组件信息泄露漏洞
CVE-2015-1777Red Hat Gluster安全漏洞
CVE-2018-10063Joomla! Convert Forms 命令注入漏洞
CVE-2017-6910Kaazing Gateway 信息泄露漏洞
CVE-2018-9118WordPress 99 Robots WP Background Takeover Advertisements插件路径遍历漏洞
CVE-2018-9155Open-AudIT Professional 跨站脚本漏洞
CVE-2018-9842CyberArk Password Vault 信息泄露漏洞
CVE-2018-9843CyberArk Password Vault Web Access 安全漏洞
CVE-2018-9860Botan 数字错误漏洞
CVE-2018-0967Microsoft Windows SNMP Service 安全漏洞
CVE-2018-1010Microsoft Windows 安全漏洞

Showing top 20 of 42 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2014-6633

No comments yet


Leave a comment