Total
2906 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-9001 | 1 Incrediblepbx | 1 Incredible Pbx 11 | 2014-11-20 | 6.5 MEDIUM | N/A |
reminders/index.php in Incredible PBX 11 2.0.6.5.0 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) APPTMIN, (2) APPTHR, (3) APPTDA, (4) APPTMO, (5) APPTYR, or (6) APPTPHONE parameters. | |||||
CVE-2012-2301 | 1 Ubercart | 1 Ubercart | 2014-11-19 | 6.0 MEDIUM | N/A |
The Ubercart module 6.x-2.x before 6.x-2.8 for Drupal allows remote authenticated users with the "administer product classes" permission to execute arbitrary PHP code via unspecified vectors. | |||||
CVE-2014-3910 | 1 Emurasoft | 1 Emftp | 2014-11-18 | 4.4 MEDIUM | N/A |
Emurasoft EmFTP allows local users to gain privileges via a Trojan horse executable file that is launched during an attempt to read a similarly named file that lacks a filename extension. | |||||
CVE-2014-8949 | 1 Imember360 | 1 Imember360 | 2014-11-17 | 6.0 MEDIUM | N/A |
The iMember360 plugin 3.8.012 through 3.9.001 for WordPress allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the i4w_trace parameter. NOTE: this can be leveraged with CVE-2014-8948 to allow remote attackers to execute code. NOTE: it is not clear whether this issue itself crosses privileges. | |||||
CVE-2014-5519 | 1 Phpwiki Project | 1 Phpwiki | 2014-11-13 | 7.5 HIGH | N/A |
The Ploticus module in PhpWiki 1.5.0 allows remote attackers to execute arbitrary code via shell metacharacters in a device option in the edit[content] parameter to index.php/HeIp. NOTE: some of these details are obtained from third party information. | |||||
CVE-2014-8669 | 1 Sap | 1 Customer Relationship Management | 2014-11-06 | 10.0 HIGH | N/A |
The SAP Promotion Guidelines (CRM-MKT-MPL-TPM-PPG) module for SAP CRM allows remote attackers to execute arbitrary code via unspecified vectors. | |||||
CVE-2014-8661 | 1 Sap | 1 Customer Relationship Management Internet Sales | 2014-11-06 | 10.0 HIGH | N/A |
The SAP CRM Internet Sales module allows remote attackers to execute arbitrary commands via unspecified vectors. | |||||
CVE-2010-4820 | 1 Ghostscript | 1 Ghostscript | 2014-11-01 | 4.4 MEDIUM | N/A |
Untrusted search path vulnerability in Ghostscript 8.62 allows local users to execute arbitrary PostScript code via a Trojan horse Postscript library file in Encoding/ under the current working directory, a different vulnerability than CVE-2010-2055. | |||||
CVE-2014-8346 | 1 Samsung | 2 Findmymobile, Mobile | 2014-10-24 | 7.8 HIGH | N/A |
The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic. | |||||
CVE-2014-7226 | 1 Rejetto | 1 Http File Server | 2014-10-10 | 7.5 HIGH | N/A |
The file comment feature in Rejetto HTTP File Server (hfs) 2.3c and earlier allows remote attackers to execute arbitrary code by uploading a file with certain invalid UTF-8 byte sequences that are interpreted as executable macro symbols. | |||||
CVE-2014-3947 | 1 Alex Kellner | 1 Powermail | 2014-10-09 | 7.5 HIGH | N/A |
Unrestricted file upload vulnerability in the powermail extension before 1.6.11 and 2.x before 2.0.14 for TYPO3 allows remote attackers to execute arbitrary code by uploading a file with a crafted extension, then accessing it via unspecified vectors. | |||||
CVE-2014-7296 | 1 Eng | 1 Spagobi | 2014-10-09 | 6.8 MEDIUM | N/A |
The default configuration in the accessibility engine in SpagoBI 5.0.0 does not set FEATURE_SECURE_PROCESSING, which allows remote authenticated users to execute arbitrary Java code via a crafted XSL document. | |||||
CVE-2014-6433 | 1 Gopro | 2 Gopro Hero, Gopro Hero Firmware | 2014-10-08 | 10.0 HIGH | N/A |
gpExec in GoPro HERO 3+ allows remote attackers to execute arbitrary files via a the (1) a1 or (2) a2 parameter in a start action. | |||||
CVE-2013-1436 | 1 Xmonad | 1 Xmonad-contrab | 2014-10-07 | 7.5 HIGH | N/A |
The XMonad.Hooks.DynamicLog module in xmonad-contrib before 0.11.2 allows remote attackers to execute arbitrary commands via a web page title, which activates the commands when the user clicks on the xmobar window title, as demonstrated using an action tag. | |||||
CVE-2014-6298 | 1 Mm Forum Project | 1 Mm Forum | 2014-10-06 | 7.5 HIGH | N/A |
Unrestricted file upload vulnerability in the mm_forum extension before 1.9.3 for TYPO3 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via unspecified vectors. | |||||
CVE-2012-5495 | 1 Plone | 1 Plone | 2014-10-02 | 5.0 MEDIUM | N/A |
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to "go_back." | |||||
CVE-2012-5493 | 1 Plone | 1 Plone | 2014-10-01 | 8.5 HIGH | N/A |
gtbn.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain permissions to bypass the Python sandbox and execute arbitrary Python code via unspecified vectors. | |||||
CVE-2014-5324 | 1 Najeebmedia | 1 N-media File Uploader | 2014-09-26 | 6.5 MEDIUM | N/A |
Unrestricted file upload vulnerability in the N-Media file uploader plugin before 3.4 for WordPress allows remote authenticated users to execute arbitrary PHP code by leveraging Author privileges to store a file. | |||||
CVE-2014-2378 | 1 Sensysnetworks | 4 Trafficdot, Vds, Vsn240-f and 1 more | 2014-09-08 | 7.6 HIGH | N/A |
Sensys Networks VSN240-F and VSN240-T sensors VDS before 2.10.1 and TrafficDOT before 2.10.3 do not verify the integrity of downloaded updates, which allows remote attackers to execute arbitrary code via a Trojan horse update. | |||||
CVE-2014-0485 | 1 S3ql Project | 1 S3ql | 2014-09-03 | 7.5 HIGH | N/A |
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/. |