CVE-2015-4674

The autoupdate implementation in TimeDoctor Pro 1.4.72.3 on Windows relies on unsigned installer files that are retrieved without use of SSL, which makes it easier for man-in-the-middle attackers to execute arbitrary code via a crafted file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:timedoctor:timedoctor:1.4.72.3:*:*:*:pro:*:*:*

History

21 Nov 2024, 02:31

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2015/Jun/105 - Exploit () http://seclists.org/fulldisclosure/2015/Jun/105 - Exploit
References () http://www.securityfocus.com/archive/1/535881/100/700/threaded - () http://www.securityfocus.com/archive/1/535881/100/700/threaded -
References () http://www.securityfocus.com/bid/75572 - () http://www.securityfocus.com/bid/75572 -

Information

Published : 2015-08-07 01:59

Updated : 2024-11-21 02:31


NVD link : CVE-2015-4674

Mitre link : CVE-2015-4674

CVE.ORG link : CVE-2015-4674


JSON object : View

Products Affected

timedoctor

  • timedoctor
CWE
CWE-345

Insufficient Verification of Data Authenticity