CVE-2018-14581
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
31/07/2018
Last modified:
05/10/2018
Description
Redgate .NET Reflector before 10.0.7.774 and SmartAssembly before 6.12.5 allow attackers to execute code by decompiling a compiled .NET object (such as a DLL or EXE file) with a specific embedded resource file.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:red-gate:.net_reflector:*:*:*:*:*:*:*:* | 10.0.7.774 (excluding) | |
| cpe:2.3:a:red-gate:smartassembly:*:*:*:*:*:*:*:* | 6.12.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://documentation.red-gate.com/ref10/release-notes-and-other-versions/net-reflector-10-0-release-notes
- https://documentation.red-gate.com/sa6/release-notes-and-other-versions/smartassembly-6-12-release-notes
- https://www.nccgroup.trust/us/our-research/technical-advisory-code-execution-by-viewing-resource-files-in-.net-reflector/?research=Technical%20advisories



