CVE-2022-36408
Apache Web Server Remote Buffer Overflow
Description
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-31181. Reason: This candidate is a duplicate of CVE-2022-31181. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2022-31181 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
INFO
Published Date :
July 22, 2022, 10:15 p.m.
Last Modified :
Nov. 7, 2023, 3:49 a.m.
Remotely Exploit :
No
Source :
[email protected]
Public PoC/Exploit Available at Github
CVE-2022-36408 has a 1 public
PoC/Exploit
available at Github.
Go to the Public Exploits
tab to see the list.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Module for PrestaShop 1.6.1.X/1.7.X to fix CVE-2022-31181 / CVE-2022-36408 vulnerability (Chain SQL Injection)
patch prestashop prestashop-module security vulnerability
PHP
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2022-36408
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2022-36408
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by [email protected]
Nov. 07, 2023
Action Type Old Value New Value Changed Description ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-31181. Reason: This candidate is a duplicate of CVE-2022-31181. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2022-31181 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-31181. Reason: This candidate is a duplicate of CVE-2022-31181. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2022-31181 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage -
CVE Modified by [email protected]
Aug. 03, 2022
Action Type Old Value New Value Changed Description PrestaShop 1.6.0.10 through 1.7.x before 1.7.8.7 allows remote attackers to execute arbitrary code, aka a "previously unknown vulnerability chain" related to SQL injection and MySQL Smarty cache storage injection, as exploited in the wild in July 2022. ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-31181. Reason: This candidate is a duplicate of CVE-2022-31181. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2022-31181 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. Removed Reference https://build.prestashop.com/news/major-security-vulnerability-on-prestashop-websites/ [Exploit, Mitigation, Vendor Advisory] -
CVE Rejected by [email protected]
Aug. 03, 2022
Action Type Old Value New Value -
Initial Analysis by [email protected]
Aug. 01, 2022
Action Type Old Value New Value Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Changed Reference Type https://build.prestashop.com/news/major-security-vulnerability-on-prestashop-websites/ No Types Assigned https://build.prestashop.com/news/major-security-vulnerability-on-prestashop-websites/ Exploit, Mitigation, Vendor Advisory Added CWE NIST CWE-89 Added CPE Configuration OR *cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:* versions from (including) 1.6.0.10 up to (excluding) 1.7.8.7 -
CVE Modified by [email protected]
Jul. 26, 2022
Action Type Old Value New Value Changed Description PrestaShop 1.6.0.10 through 1.7.x before 1.7.8.2 allows remote attackers to execute arbitrary code, aka a "previously unknown vulnerability chain" related to SQL injection, as exploited in the wild in July 2022. PrestaShop 1.6.0.10 through 1.7.x before 1.7.8.7 allows remote attackers to execute arbitrary code, aka a "previously unknown vulnerability chain" related to SQL injection and MySQL Smarty cache storage injection, as exploited in the wild in July 2022.
Vulnerability Scoring Details
Exploit Prediction
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.
0.05 }} 0.00%
score
0.15563
percentile