Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D8643385-8673-40EE-97D0-87F2C39D91D1", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D71D0337-96AF-4F40-9466-52C8D0A16747", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "0217F357-EEF6-4E0F-B8C4-79B60D8B9638", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C51C67-1870-4302-B1A2-298E3A675640", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4E7EE-DB6B-456F-80A0-DC3DAC93BE94", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.4:p3:*:*:*:*:*:*", "matchCriteriaId": "647925AE-3268-4CA8-A59E-76F8B85B4502", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "15E42B89-8F34-4272-8F15-9C39CA7D701C", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.5:p1:*:*:*:*:*:*", "matchCriteriaId": "5F58A7A6-84C5-4D0D-931C-AC401532D938", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "57B206CC-4ABC-4207-88C0-D75AB5455AFE", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.6:p2:*:*:*:*:*:*", "matchCriteriaId": "59DE46A6-FDA7-4FB7-9ED5-FB6274B6938A", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "863835E5-2D07-4F79-842B-69CA65BD8CF2", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "44CBBED1-40D4-4851-949A-8FC0CF4E31E6", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.8:p2:*:*:*:*:*:*", "matchCriteriaId": "8A38D396-D5FC-4B87-9359-AB32A367D11B", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4408D4CD-4B7F-4A57-8C19-CDB517A48AF1", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.9:p5:*:*:*:*:*:*", "matchCriteriaId": "A60296F9-8A44-4EA2-80C7-1734820B346C", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "7CE0F2BF-6850-4860-84A0-3C45629131CF", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "175E9F04-B0E1-4504-BB46-42F6AF64A1E3", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1296B22E-6A9F-4354-A3F9-C0098E15E5B6", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1F084FB2-AC3E-426C-AE51-7916A56A0576", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "74FEA650-B6CF-4F43-A302-4665A63145DC", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.1.4:p11:*:*:*:*:*:*", "matchCriteriaId": "17A20CFC-0A1B-4A18-99DC-076ADA132311", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1CFBA46-C600-41AA-BDDA-205B1BDF435B", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.2.0:p5:*:*:*:*:*:*", "matchCriteriaId": "CC6EB13B-E1D4-4533-81BF-6331E8633153", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F2B5B416-5125-4BF9-B60C-92BAC0CBA4DC", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1D01F38E-039A-4F19-AAFC-67B67DCE5DDE", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.2.2:p2:*:*:*:*:*:*", "matchCriteriaId": "E7DF4DDC-BF1F-4BE3-9247-59D32EFB87CD", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "28A7169C-E465-40AC-B054-2CB2E9DA0D10", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.2.3:p14:*:*:*:*:*:*", "matchCriteriaId": "630E621B-6BF4-4006-A465-92ACFAF56DE2", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9757868-2F5C-4796-9C35-DC3A6A827AAE", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.0:p4:*:*:*:*:*:*", "matchCriteriaId": "93D0084C-04DE-4813-AFAB-3D60999F35E6", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "8139DFA4-CF47-442F-B238-D6A8B9F451EE", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.1:p4:*:*:*:*:*:*", "matchCriteriaId": "9F67584A-D847-4128-A3F9-FCE29C6D9AD5", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "1908130F-299F-4DFA-9557-FE0667083D02", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.2:p2:*:*:*:*:*:*", "matchCriteriaId": "1397A083-FD8D-47CF-85A0-32C509B00CC5", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "4BB625BF-972B-46BF-8CDE-89C3C1777D41", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.3:p1:*:*:*:*:*:*", "matchCriteriaId": "CAC4DF15-0D30-4048-BBEC-2CF0326B5DC3", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "3BB05EB8-2415-4B30-9243-89088E033CED", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.4:p1:*:*:*:*:*:*", "matchCriteriaId": "6AAA99FC-045B-4C78-A07D-D4F4577E9927", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1B5858D-1FDD-4D29-B2BA-21C0743DF04F", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.5:p2:*:*:*:*:*:*", "matchCriteriaId": "E6D557F2-4EE1-4640-920F-15B7CAFAD5B3", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "BD5777A6-4466-420F-98B8-0C5DB06B391C", "vulnerable": true}, {"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "8F7766EC-5D6A-4050-ACC6-85A443347A78", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Exponent CMS 2.x before 2.3.7 Patch 3 allows remote attackers to execute arbitrary code via the sc parameter to install/index.php."}, {"lang": "es", "value": "Exponent CMS 2.x en versiones anteriores a 2.3.7 Patch 3 permite a atacantes remotos ejecutar c\u00f3digo arbitrarios a trav\u00e9s del par\u00e1metro sc para install/index.php."}], "id": "CVE-2016-2242", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-01-23T21:59:01.097", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Patch", "Third Party Advisory"], "url": "http://packetstormsecurity.com/files/135721/Exponent-2.3.7-PHP-Code-Execution.html"}, {"source": "cve@mitre.org", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://www.exponentcms.org/news/patch-3-released-for-v2-3-7"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Mitigation", "Patch", "Vendor Advisory"], "url": "http://www.exponentcms.org/news/show/title/security-notice-closing-an-exponent-security-vulnerability"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/537499/100/0/threaded"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Patch", "Third Party Advisory"], "url": "https://www.htbridge.com/advisory/HTB23290"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Patch", "Third Party Advisory"], "url": "http://packetstormsecurity.com/files/135721/Exponent-2.3.7-PHP-Code-Execution.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://www.exponentcms.org/news/patch-3-released-for-v2-3-7"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Mitigation", "Patch", "Vendor Advisory"], "url": "http://www.exponentcms.org/news/show/title/security-notice-closing-an-exponent-security-vulnerability"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/537499/100/0/threaded"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Patch", "Third Party Advisory"], "url": "https://www.htbridge.com/advisory/HTB23290"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-94"}], "source": "nvd@nist.gov", "type": "Primary"}]}