Executive Summary

Name CVE-2007-3572 First vendor Publication 2007-07-05
Vendor Cve Last vendor Modification 2017-07-29

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Incomplete blacklist vulnerability in cgi-bin/runDiagnostics.cgi in the web interface on the Yoggie Pico and Pico Pro allows remote attackers to execute arbitrary commands via shell metacharacters in the param parameter, as demonstrated by URL encoded "`" (backtick) characters (%60 sequences).

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3572

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-6 Argument Injection
CAPEC-15 Command Delimiters
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-63 Simple Script Injection
CAPEC-71 Using Unicode Encoding to Bypass Validation Logic
CAPEC-73 User-Controlled Filename
CAPEC-85 Client Network Footprinting (using AJAX/XSS)
CAPEC-86 Embedding Script (XSS ) in HTTP Headers
CAPEC-88 OS Command Injection
CAPEC-108 Command Line Execution through SQL Injection
CAPEC-163 Spear Phishing

CWE : Common Weakness Enumeration

% Id Name

CPE : Common Platform Enumeration

Application 1
Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
37808 Yoggie Pico Web Interface cgi-bin/runDiagnostics.cgi param Variable Shell Com...

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/24743
FULLDISC http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0020.html
OSVDB http://osvdb.org/37808
SECUNIA http://secunia.com/advisories/25902
VUPEN http://www.vupen.com/english/advisories/2007/2417
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/35208

Alert History

If you want to see full details history, please login or register.
Date Informations
2021-05-04 12:06:04
  • Multiple Updates
2021-04-22 01:06:36
  • Multiple Updates
2020-05-23 00:20:03
  • Multiple Updates
2017-07-29 12:02:22
  • Multiple Updates
2016-06-28 16:42:07
  • Multiple Updates
2016-04-26 16:19:45
  • Multiple Updates
2013-05-11 10:30:11
  • Multiple Updates