{ "schema_version": "1.4.0", "id": "GHSA-r3r3-jh75-c3jc", "modified": "2025-04-12T12:33:06Z", "published": "2022-05-17T04:45:39Z", "aliases": [ "CVE-2014-2994" ], "details": "Stack-based buffer overflow in Acunetix Web Vulnerability Scanner (WVS) 8 build 20120704 allows remote attackers to execute arbitrary code via an HTML file containing an IMG element with a long URL (src attribute).", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-2994" }, { "type": "WEB", "url": "https://www.youtube.com/watch?v=RHaMx8K1GeM" }, { "type": "WEB", "url": "http://an7isec.blogspot.co.il/2014/04/pown-noobs-acunetix-0day.html" }, { "type": "WEB", "url": "http://osandamalith.wordpress.com/2014/04/24/pwning-script-kiddies-acunetix-buffer-overflow" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/126306/Acunetix-8-Stack-Buffer-Overflow.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/126307/Acunetix-8-Scanner-Buffer-Overflow.html" }, { "type": "WEB", "url": "http://www.acunetix.com/blog/news/misleading-reports-0-day-acunetix-wvs" }, { "type": "WEB", "url": "http://www.exploit-db.com/exploits/32997" } ], "database_specific": { "cwe_ids": [ "CWE-119" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-04-27T04:32:00Z" } }