{"id":"CVE-2018-14055","details":"ZNC before 1.7.1-rc1 does not properly validate untrusted lines coming from the network, allowing a non-admin user to escalate his privilege and inject rogue values into znc.conf.","modified":"2026-05-17T11:55:19.252380425Z","published":"2018-07-15T01:29:03.587Z","related":["openSUSE-SU-2024:11542-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"9.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"debian:debian_linux"}]},"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201807-03"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4252"},{"type":"FIX","url":"https://github.com/znc/znc/commit/a7bfbd93812950b7444841431e8e297e62cb524e"},{"type":"FIX","url":"https://github.com/znc/znc/commit/d22fef8620cdd87490754f607e7153979731c69d"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}]}