{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T14:58:01.925","vulnerabilities":[{"cve":{"id":"CVE-2024-4299","sourceIdentifier":"twcert@cert.org.tw","published":"2024-04-29T04:15:08.623","lastModified":"2026-01-26T14:27:50.970","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability for Command Injection attacks, enabling execution of arbitrary system commands."},{"lang":"es","value":"La interfaz de configuración del sistema de HGiga iSherlock (incluidos MailSherlock, SpamSherock, AuditSherlock) no filtra caracteres especiales en ciertos parámetros de función, lo que permite a atacantes remotos con privilegios administrativos explotar esta vulnerabilidad para ataques de inyección de comandos, permitiendo la ejecución de comandos arbitrarios del sistema."}],"metrics":{"cvssMetricV31":[{"source":"twcert@cert.org.tw","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"twcert@cert.org.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hgiga:isherlock:*:*:*:*:*:*:*:*","versionStartIncluding":"4.5","versionEndExcluding":"4.5-147","matchCriteriaId":"77F55419-F1D0-456E-B3D1-B8CBA20364D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:hgiga:isherlock:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.5-147","matchCriteriaId":"773E80C7-70F2-41FD-8A42-EDA3E9AE01AE"}]}]}],"references":[{"url":"https://www.chtsecurity.com/news/4559fabd-43d1-4324-a0b3-f459a05c2290","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://www.chtsecurity.com/news/f67fd9b5-cb7a-42e4-bcb7-cc1c73d1f851","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://www.twcert.org.tw/tw/cp-132-7771-36c50-1.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://www.chtsecurity.com/news/4559fabd-43d1-4324-a0b3-f459a05c2290","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.chtsecurity.com/news/f67fd9b5-cb7a-42e4-bcb7-cc1c73d1f851","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.twcert.org.tw/tw/cp-132-7771-36c50-1.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}